AI for Dynamic Threat Intelligence and Automated Response in Networked Systems | IJCT Volume 13 – Issue 2 | IJCT-V13I2P4

International Journal of Computer Techniques
ISSN 2394-2231
Volume 13, Issue 2  |  Published: March – April 2026

Author

Deepak Tomar, Ritu Masandra, Kismat Chhillar, Sanchit Agarwal

Abstract

The rise of connected devices and the growing complexity of cyber threats like advanced persistent threats (APTs) and zero-day vulnerabilities have made traditional, signature-based network security models outdated. This report explores how artificial intelligence (AI) is reshaping cyber defense into a proactive, adaptive, and autonomous approach. It breaks down the core ideas behind AI-driven Dynamic Threat Intelligence (DTI) and Automated Incident Response (AIR), which allow for real-time analysis and rapid threat mitigation. The report also dives into essential AI and machine learning (ML) models, from behavioral analysis to deep reinforcement learning, that are driving this change. It showcases practical, real-world applications, such as using digital twins for safe simulations and the capabilities of commercial platforms like Darktrace. Lastly, it critically examines the technical, operational and ethical challenges we face, including adversarial AI attacks, the black box problem, and data-driven bias, while also looking ahead to the future of AI-native Security Operations Centers (SOCs), where human expertise is enhanced by autonomous AI agents. This paper serves as a structured guide for researchers and practitioners, laying out a roadmap for building more resilient, intelligent, and ethical cyber defense systems.

Keywords

Dynamic Threat Intelligence (DTI), Automated Incident Response (AIR), Artificial Intelligence (AI), Machine Learning (ML), Network Security, Computer Network, Anomaly Detection, Computer Networks Security, Cybersecurity.

Conclusion

AI isn’t just a minor upgrade to traditional security; it’s a game changer that completely reshapes how we protect our networked systems. By moving from a reactive, signature-based defense to a proactive, adaptive and predictive approach, AI brings the speed and scale we need to tackle the growing complexity of modern cyber threats. Concepts like Dynamic Threat Intelligence (DTI) and Automated Incident Response (AIR), especially when fueled by cutting-edge AI models such as GNNs and deep reinforcement learning, form a seamless, closed-loop system that continuously learns and acts on its own. That said, the journey toward fully autonomous cyber defense is packed with serious technical and ethical hurdles. We need to tackle the vulnerabilities of AI systems to adversarial attacks, the operational headaches caused by false positives and the ethical questions surrounding accountability, bias and privacy. This calls for ongoing research and the creation of strong frameworks. A balanced approach that harnesses AI’s speed and scale while keeping human oversight and expertise for strategic decision-making and ethical governance is essential. The future of AI in cybersecurity isn’t about replacing human analysts; it’s about enhancing their capabilities, leading to the development of more resilient, intelligent, and ethical cyber defense systems that can genuinely secure our increasingly interconnected world.

References

[1] M. Agoramoorthy, A. Ali, D. Sujatha, M. Raj TF and G. Ramesh, “An Analysis of Signature-Based Components in Hybrid Intrusion Detection Systems,” in Intelligent Computing and Control for Engineering and Business Systems (ICCEBS-2023), Chennai, India, 2023. [2] D. Gupta, “The Invisible Defence: Detecting Zero-Day Threats with AI,” in Digital Defence, Abington, Oxon, CRC Press, 2025, pp. 31-52. [3] F. Pacheco, E. Exposito, M. Gineste, C. Baudoin and J. Aguilar, “Towards the Deployment of Machine Learning Solutions in Network Traffic Classification: A Systematic Survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1988-2014, November 2019. [4] R. Kumar, M. Swarnkar, G. Singal and N. Kumar, “IoT Network Traffic Classification Using Machine Learning Algorithms: An Experimental Analysis,” IEEE Internet of Things Journal, vol. 9, no. 2, pp. 989-1008, January 2022. [5] N. H. A. Mutalib, . A. Q. M. Sabri, A. W. A. Wahab, E. R. M. F. Abdullah and N. AlDahoul, “Explainable deep learning approach for advanced persistentthreats (APTs) detection in cybersecurity: a review,” Artificial Intelligence Review, vol. 57, no. 11, p. 297, September 2024. [6] C. I. Rajapaksha, “Machine Learning-Driven Anomaly Detection Models for Cloud-Hosted E-Payment Infrastructures,” Journal of Computational Intelligence for Hybrid Cloud and Edge Computing Networks, vol. 6, no. 12, pp. 1-11, December 2022. [7] R. Marinho and R. Holanda, “Automated emerging cyber threat identification and profiling based on natural language processing,” IEEE Access, vol. 11, no. 1, pp. 58915-58936, March 2023. [8] M. Sewak, S. K. Sahay and H. Rathore, “Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection,” Information Systems Frontiers, vol. 25, no. 2, pp. 589-611, April 2023. [9] A. A. S. Mohammad, S. I. S. Mohammad, B. Al Oraini, A. Vasudevan, A. Hindieh, A. Altarawneh, M. T. Alshurideh and I. Ali, “Strategies for applying interpretable and explainable AI in real world IoT applications,” Discover Internet of Things, vol. 5, no. 1, p. 71, June 2025. [10] H. Wasserman-Rozen, R. Gilad-Bachrach and N. Elkin-Koren, “Lost in translation: the limits of explainability in AI,” Cardozo Arts & Ent. LJ, vol. 42, no. 1, p. 391, 2024.

How to Cite This Paper

Deepak Tomar, Ritu Masandra, Kismat Chhillar, Sanchit Agarwal (2026). AI for Dynamic Threat Intelligence and Automated Response in Networked Systems. International Journal of Computer Techniques, 13(2). ISSN: 2394-2231.

© 2026 International Journal of Computer Techniques (IJCT). All rights reserved.

Submit Your Paper