Adaptive Deception: Real-Time, AI-Powered Cybersecurity for Modern Threat Landscapes
DOI:
https://doi.org/10.4108/eetss.9501Keywords:
Cybersecurity, Threat Intelligence, Deception Technologies, Machine Learning, Moving Target Defense, Situational Awareness, Incident ResponseAbstract
INTRODUCTION: The current volume and sophistication of cyber threats are beyond overshadowing the security capabilities of traditional reactive security approaches. Herein, we present a new cybersecurity framework that incorporates real-time threat intelligence with adaptive deception technologies for the proactive defense of digital infrastructures.
OBJECTIVES: The objectives of this research include: (1) develop an AI-driven cybersecurity framework, (2) incorporate real-time threat intelligence and deception-based active defense approaches, and (3) assess performance in simulated and real-world cyber-attack scenarios.
METHODS: The proposed cyber-defense framework uses machine learning approaches, automated deception technologies (e.g., honeypots, moving target defense), and real-time threat intelligence feeds. The framework is constructed in a modular architecture and tested in simulation environments with real-time attack emulation.
RESULTS: The framework performed with over 93% of threats visible, an adaptive response time < 2 seconds, and < 12% overhead imposed on the system. The framework achieved > 85% threat prevention, measured long recovery time, and measured system integrity improvements.
CONCLUSION: The conclusion of this work illustrates that a proactive cybersecurity framework can be achieved through the integration of AI-enabled adaptive response with real-time threat intelligence. This work represents an advancement toward intelligent, self-learning systems capable of anticipating and responding to developing cyber threats with minimal human intervention.
References
[1] Zhang L, Thing VLL. Three decades of deception techniques in active cyber defense: retrospect and outlook. arXiv preprint arXiv:2104.03594; 2021.
[2] Cho JH, Sharma DP, Alavizadeh H, Yoon S, Ben-Asher N, Moore TJ, Kim DS, Lim H, Nelson FF. Toward proactive, adaptive defense: a survey on moving target defense. IEEE Communications Surveys & Tutorials. 2016;18(2):988-1014.
[3] Al-Shaer E, et al. Toward network configuration randomization for moving target defense. In: ACM Workshop on Moving Target Defense; 2013.
[4] Jajodia S, Ghosh AK, Subrahmanian VS, Swarup V, Wang C. Moving target defense: creating asymmetric uncertainty for cyber threats. Springer; 2011.
[5] Spitzner L. Honeypots: tracking hackers. Addison-Wesley; 2003.
[6] MITRE Corporation. Deception Technologies: Hiding the Real Targets. Technical report; 2017.
[7] Ahmed M, Mahmood AN, Hu J. A survey of network anomaly detection techniques. J Netw Comput Appl. 2016;60:19-31.
[8] Almomani A, et al. A survey of phishing email filtering techniques. IEEE Communications Surveys & Tutorials. 2013;15(4):2070-2090.
[9] Xu K, et al. A survey of machine learning techniques in adversarial environments. In: 6th ACM Conference on Data and Application Security and Privacy; 2016. p.69-76.
[10] Liu Y, Coman R, Cheng P. An AI-driven cyber threat intelligence framework. IEEE Trans Dependable Secure Comput. 2023.
[11] Recorded Future. The role of threat intelligence in proactive cyber defense; 2023.
[12] Ruan K. Cyber threat intelligence: challenges and opportunities. Digital Investigation. 2014;11(3):224-231.
[13] Harel A, Shabtai A, Rokach L, Elovici Y. Automated threat hunting using threat intelligence and deception systems. Comput Secur. 2022;112:102511.
[14] Kent K, Chevalier S, Grance T, Dang H. Guide to computer security log management. NIST Special Publication 800-92; 2006.
[15] Shimeall T, Baker D, Skora M, Kent A, White J. Analysis of attack statistics for proactive cyber defense. In: DARPA Information Survivability Conference and Exposition; 2001. p.345-357.
[16] Dhaya R, Kanthavel R. Breaking the Loop: Adversarial Attacks on Cognitive-AI Feedback via Neural Signal Manipulation. EAI Endorsed Trans. Sec. Saf. 2025;9(1). https://publications.eai.eu/index.php/sesa/article/view/9502
[17] Dhaya R, Kanthavel R. Cloud-based multiple importance sampling algorithm with AI-based CNN classifier for secure infrastructure. ICCK Trans. Emerg. Top. Artif. Intell. 2025. /www.icck.org/article/ epdf/tetai/ 261.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 EAI Endorsed Transactions on Security and Safety

This work is licensed under a Creative Commons Attribution 4.0 International License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 4.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.