Claim Missing Document
Check
Articles

Found 2 Documents
Search

Recurrent neural network for adaptive cyber attack prediction on critical defense systems Jonson Manurung; Hengki Tamando Sihotang
Journal of Defense Technology and Engineering Vol. 1 No. 1 (2025): July, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The threat of cyber attacks against critical defense systems is becoming increasingly complex and dynamic, requiring adaptive and proactive prediction mechanisms. This study aims to develop a Recurrent Neural Network (RNN) model to predict cyber attacks on critical defense systems with high accuracy and generalization capabilities against new attacks. The CICIDS2020 dataset was used to train and test the model, with 70% of the data allocated for training, 15% for validation, and 15% for testing. The RNN architecture was optimized by selecting the number of hidden layers, the number of neurons per layer, the activation function, and the application of dropout and regularization to minimize the risk of overfitting. The model was trained using the Backpropagation Through Time (BPTT) algorithm and evaluated using accuracy, precision, recall, F1-score, and AUC metrics. The results show that RNN outperforms LSTM, Random Forest, and SVM algorithms, with an accuracy of 97.8%, precision of 96.5%, recall of 95.9%, F1-score of 96.2%, and AUC of 0.981, and is capable of detecting rare attacks. These findings confirm the effectiveness of RNN in capturing long-term temporal patterns in cyberattack data and providing adaptive predictions for new attacks. The practical implications of this research include strengthening critical defense systems through early detection and real-time mitigation of cyberattacks, as well as providing a basis for the development of reliable proactive security systems.
Blockchain-enhanced security framework for defense supply chain management: an AI-driven smart contract approach with distributed ledger technology Hondor Saragih; Jonson Manurung; Hengki Tamando Sihotang; I Made Aditya Pradhana Putra
Journal of Defense Technology and Engineering Vol. 1 No. 2 (2026): January, Journal of Defense Technology and Engineering
Publisher : Fakultas Teknik dan Teknologi Pertahanan, Universitas Pertahanan Republik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Defense supply chains face critical security challenges including counterfeit components, unauthorized access, data tampering, and supply chain attacks that compromise operational integrity and national security. Existing blockchain implementations suffer from limited scalability, inadequate threat detection mechanisms, and insufficient integration with modern AI technologies for real-time security monitoring. This research develops an AI-Enhanced Blockchain Security Framework combining smart contracts with distributed ledger technology specifically designed for defense supply chain management. The framework employs multi-signature authentication, cryptographic verification, and machine learning-based anomaly detection across a three-layer architecture (blockchain layer, security layer, analytics layer). Validation using the DataCo supply chain dataset (180K operations) and Backstabber's knife collection attack patterns (174 documented attacks) demonstrates 94.7% attack detection accuracy, 87.3% reduction in unauthorized access attempts, and 99.2% data integrity verification rate. The system achieved 850 transactions per second (TPS) throughput with 1.8-second average latency and 40% cost reduction compared to traditional centralized systems. Smart contract execution showed 99.96% reliability across 10,000 test scenarios with automated enforcement of security policies. Statistical validation confirmed significant superiority over conventional approaches (p<0.001). Future work includes quantum-resistant cryptography, federated learning for privacy-preserving analytics, cross-chain interoperability, and integration with IoT sensors for real-time supply chain monitoring.