Adaptive Deception: Real-Time, AI-Powered Cybersecurity for Modern Threat Landscapes

Authors

DOI:

https://doi.org/10.4108/eetss.9501

Keywords:

Cybersecurity, Threat Intelligence, Deception Technologies, Machine Learning, Moving Target Defense, Situational Awareness, Incident Response

Abstract

INTRODUCTION: The current volume and sophistication of cyber threats are beyond overshadowing the security capabilities of traditional reactive security approaches. Herein, we present a new cybersecurity framework that incorporates real-time threat intelligence with adaptive deception technologies for the proactive defense of digital infrastructures.

OBJECTIVES: The objectives of this research include: (1) develop an AI-driven cybersecurity framework, (2) incorporate real-time threat intelligence and deception-based active defense approaches, and (3) assess performance in simulated and real-world cyber-attack scenarios.

METHODS: The proposed cyber-defense framework uses machine learning approaches, automated deception technologies (e.g., honeypots, moving target defense), and real-time threat intelligence feeds. The framework is constructed in a modular architecture and tested in simulation environments with real-time attack emulation.

RESULTS: The framework performed with over 93% of threats visible, an adaptive response time < 2 seconds, and < 12% overhead imposed on the system. The framework achieved > 85% threat prevention, measured long recovery time, and measured system integrity improvements.

CONCLUSION: The conclusion of this work illustrates that a proactive cybersecurity framework can be achieved through the integration of AI-enabled adaptive response with real-time threat intelligence. This work represents an advancement toward intelligent, self-learning systems capable of anticipating and responding to developing cyber threats with minimal human intervention.

References

[1] Zhang L, Thing VLL. Three decades of deception techniques in active cyber defense: retrospect and outlook. arXiv preprint arXiv:2104.03594; 2021.

[2] Cho JH, Sharma DP, Alavizadeh H, Yoon S, Ben-Asher N, Moore TJ, Kim DS, Lim H, Nelson FF. Toward proactive, adaptive defense: a survey on moving target defense. IEEE Communications Surveys & Tutorials. 2016;18(2):988-1014.

[3] Al-Shaer E, et al. Toward network configuration randomization for moving target defense. In: ACM Workshop on Moving Target Defense; 2013.

[4] Jajodia S, Ghosh AK, Subrahmanian VS, Swarup V, Wang C. Moving target defense: creating asymmetric uncertainty for cyber threats. Springer; 2011.

[5] Spitzner L. Honeypots: tracking hackers. Addison-Wesley; 2003.

[6] MITRE Corporation. Deception Technologies: Hiding the Real Targets. Technical report; 2017.

[7] Ahmed M, Mahmood AN, Hu J. A survey of network anomaly detection techniques. J Netw Comput Appl. 2016;60:19-31.

[8] Almomani A, et al. A survey of phishing email filtering techniques. IEEE Communications Surveys & Tutorials. 2013;15(4):2070-2090.

[9] Xu K, et al. A survey of machine learning techniques in adversarial environments. In: 6th ACM Conference on Data and Application Security and Privacy; 2016. p.69-76.

[10] Liu Y, Coman R, Cheng P. An AI-driven cyber threat intelligence framework. IEEE Trans Dependable Secure Comput. 2023.

[11] Recorded Future. The role of threat intelligence in proactive cyber defense; 2023.

[12] Ruan K. Cyber threat intelligence: challenges and opportunities. Digital Investigation. 2014;11(3):224-231.

[13] Harel A, Shabtai A, Rokach L, Elovici Y. Automated threat hunting using threat intelligence and deception systems. Comput Secur. 2022;112:102511.

[14] Kent K, Chevalier S, Grance T, Dang H. Guide to computer security log management. NIST Special Publication 800-92; 2006.

[15] Shimeall T, Baker D, Skora M, Kent A, White J. Analysis of attack statistics for proactive cyber defense. In: DARPA Information Survivability Conference and Exposition; 2001. p.345-357.

[16] Dhaya R, Kanthavel R. Breaking the Loop: Adversarial Attacks on Cognitive-AI Feedback via Neural Signal Manipulation. EAI Endorsed Trans. Sec. Saf. 2025;9(1). https://publications.eai.eu/index.php/sesa/article/view/9502

[17] Dhaya R, Kanthavel R. Cloud-based multiple importance sampling algorithm with AI-based CNN classifier for secure infrastructure. ICCK Trans. Emerg. Top. Artif. Intell. 2025. /www.icck.org/article/ epdf/tetai/ 261.

Downloads

Published

22-01-2026

How to Cite

1.
R K, R D. Adaptive Deception: Real-Time, AI-Powered Cybersecurity for Modern Threat Landscapes. EAI Endorsed Trans Sec Saf [Internet]. 2026 Jan. 22 [cited 2026 Jan. 25];9. Available from: https://publications.eai.eu/index.php/sesa/article/view/9501

Most read articles by the same author(s)