Deep Learning-Based Threat Intelligence Framework for Proactive Cyberattack Detection and Mitigation

Authors

  • Ashay Mohile Technical Program Manager, Infrastructure Security, IEEE senior Member. Author

DOI:

https://doi.org/10.63282/3050-922X.IJERET-V7I1P120

Keywords:

Deep Learning, Threat Detection, Cybersecurity, CNN-LSTM, Smote

Abstract

The use of cybersecurity threat detection systems that were previously effective is becoming a thing of the past as a result of the spread and complexity of cyberattacks. This study suggests the CNN-LSTM architecture and the CIC-IDS2017 dataset as the foundation of the hybrid deep learning threat detection model. The extensive data pretreatment that is practiced by the offered technique to address the problem of severe imbalance between classes is covered by data cleaning, feature extraction, normalization, label encoding, and class balancing based on the Synthetic Minority Over-sampling Technique (SMOTE). After the 80: 20 split of the processed data into training and testing samples, the performance of the model is evaluated on standard indicators, such as as accuracy (ACC) and precision (PRE) and recall (REC), F1-score (F1) and ROC-AUC. With a 99.6% ACC rate, 97.5% PRE, 97.0% REC, 98.0% F1, and 0.99% ROC-AUC, the suggested CNN-LSTM model outperforms the state-of-the-art. The hybrid architecture has been effectively compared to other models due to its flexibility to large as well as real-time network intrusion detection systems.

References

[1] M. Ashraf, R. Paudel, and B. Maskey, “Advanced Cybersecurity Strategies Leveraging Neural Networks for Protecting Critical Infrastructure against Evolving Digital Threats through Proactive Risk Management and Threat Intelligence,” ICCK Trans. Neural Comput., vol. 1, no. 1, 2024, doi: 10.62762/TNC.2025.737491.

[2] Henry Cyril, “Ai-Driven Anomaly Detection , Outage Prediction , And Self- Healing In Telecom Provisioning Systems,” Int. J. Appl. Math., vol. 38, no. 12s, pp. 2817–2832, Dec. 2025, doi: 10.12732/ijam.v38i12s.1589.

[3] S. Narang and A. Gogineni, “Zero-Trust Security in Intrusion Detection Networks: An AI-Powered Threat Detection in Cloud Environment,” Int. J. Sci. Res. Mod. Technol., vol. 4, no. 5, pp. 60–70, Jun. 2025, doi: 10.38124/ijsrmt.v4i5.542.

[4] V. Shah, “Traffic Intelligence In Iot And Cloud Networks: Tools For Monitoring, Security, And Optimization,” Int. J. Recent Technol. Sci. Manag., vol. 9, no. 5, 2024, doi: 10.10206/IJRTSM.2025894735.

[5] Md Abubokor Siam et al., “AI-Driven Cyber Threat Intelligence Systems: A National Framework for Proactive Defense Against Evolving Digital Warfare,” Int. J. Comput. Exp. Sci. Eng., vol. 11, no. 3, pp. 6126–6140, 2025, doi: 10.22399/ijcesen.3793.

[6] L. Ogbidi and B. Oteh, “Advances in Hybrid Machine Learning and Physics-Based Models for Enhanced Reservoir Simulation,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 10, no. 6, pp. 2533–2543, Dec. 2024, doi: 10.32628/IJSRCSEIT.

[7] H. Kapadia and K. C. Chittoor, “Quantum Computing Threats to Web Encryption in Banking,” Int. J. Nov. Trends Innov., vol. 2, no. 12, pp. a197–a204, 2024.

[8] M. Barbhaya, P. R. Dasari, S. K. Damarla, R. Srinivasan, and B. Huang, “A deep learning framework for cyberattack detection and classification in Industrial Control Systems,” Comput. Chem. Eng., vol. 202, p. 109278, Nov. 2025, doi: 10.1016/j.compchemeng.2025.109278.

[9] P. Nutalapati, J. R. Vummadi, S. Dodda, and N. Kamuni, “Advancing Network Intrusion Detection: A Comparative Study of Clustering and Classification on NSL-KDD Data,” in 2025 International Conference on Data Science and Its Applications (ICoDSA), IEEE, Jul. 2025, pp. 880–885. doi: 10.1109/ICoDSA67155.2025.11157595.

[10] S. Chatterjee, “Risk Management in Advanced Persistent Threats (APTs) for Critical Infrastructure in the Utility Industry,” Int. J. Multidiscip. Res., vol. 3, no. 4, Aug. 2021, doi: 10.36948/ijfmr.2021.v03i04.34396.

[11] R. Muppalaneni, A. C. Inaganti, and N. Ravichandran, “AI-Driven Threat Intelligence: Enhancing Cyber Defense with Machine Learning,” J. Comput. Innov. Appl., vol. 2, no. 1, pp. 1–11, 2024, doi: 10.63575/.

[12] V. Shewale, “Beyond EDR: Exploring the rise of XDR for unified threat detection and response,” World J. Adv. Eng. Technol. Sci., vol. 15, no. 2, pp. 380–386, May 2025, doi: 10.30574/wjaets.2025.15.2.0551.

[13] A. R. Bilipelli, “AI-Driven Intrusion Detection Systems for Large- Scale Cybersecurity Networks Data Analysis : A Comparative Study,” TIJER – Int. Res. J., vol. 11, no. 12, pp. 922–928, 2024.

[14] A. Zedan and N. H. El-Farra, “A machine-learning approach for identification and mitigation of cyberattacks in networked process control systems,” Chem. Eng. Res. Des., 2021, doi: 10.1016/j.cherd.2021.09.016.

[15] S. Kumara, “AI-Driven Threat Identification and Response: Implications for Secure and Scalable Telecom Infrastructure,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 5, no. 4, p. 559, Dec. 2025, doi: 10.48175/IJARSCT-30567.

[16] S. Thangavel, “AI Enhanced Image Processing System For Cyber Security Threat Analysis,” 2024.

[17] A. R. Alkharabsheh, F. H. Alhosani, M. H. Alameri, A. B. Alrashdi, F. M. Almenhali, and A. A. Alzaabi, “AI-Driven Proactive Framework for Cybersecurity Threat Prediction, Detection, and Attack Classification,” in 2025 International Conference on Computer Science, Technology and Engineering (ICCSTE), IEEE, Jun. 2025, pp. 12–17. doi: 10.1109/ICCSTE65902.2025.11138235.

[18] K. M. R. Seetharaman and P. Yadav, “A Machine Learning Framework for Detecting and Mitigation of Cyber Threats in IoT Environments,” in 2025 3rd International Conference on Inventive Computing and Informatics (ICICI), IEEE, Jun. 2025, pp. 1112–1119. doi: 10.1109/ICICI65870.2025.11069697.

[19] A. B. Dorothy, B. Madhavidevi, B. Nachiappan, G. Manikandan, P. K. Patjoshi, and M. Sindhuja, “AI-Driven Threat Intelligence in Cloud Computing Detecting and Responding to Cyber Attacks,” in 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), IEEE, Aug. 2024, pp. 1–6. doi: 10.1109/IACIS61494.2024.10721888.

[20] R. Vadisetty and A. Polamarasetti, “Enhancing Intrusion Detection Systems with Deep Learning and Machine Learning Algorithms for Real-Time Threat Classification,” in 2024 Asian Conference on Intelligent Technologies (ACOIT), IEEE, Sep. 2024, pp. 1–6. doi: 10.1109/ACOIT62457.2024.10939322.

[21] D. Sridevi, L. Kannagi, G. Vivekanandan, and S. Revathi, “Detecting Insider Threats in Cybersecurity Using Machine Learning and Deep Learning Techniques,” in 2023 International Conference on Communication, Security and Artificial Intelligence, ICCSAI 2023, 2023. doi: 10.1109/ICCSAI59793.2023.10421133.

[22] M. Malik and K. Singh Saini, “Network Intrusion Detection System using Reinforcement learning,” in 2023 4th International Conference for Emerging Technology (INCET), 2023, pp. 1–4. doi: 10.1109/INCET57972.2023.10170630.

[23] S. Amrale, “Anomaly Identification in Real-Time for Predictive Analytics in IoT Sensor Networks using Deep,” Int. J. Curr. Eng. Technol., vol. 14, no. 6, pp. 526–532, 2024, doi: 10.14741/ijcet/v.14.6.15.

[24] G. Sarraf, “Behavioral Analytics for Continuous Insider Threat Detection in Zero-Trust Architectures,” Int. J. Res. Anal. Rev., vol. 8, no. 4, pp. 596–602, 2021.

[25] O. Elnakib, E. Shaaban, M. Mahmoud, and K. Emara, “EIDM: deep learning model for IoT intrusion detection systems,” J. Supercomput., vol. 79, no. 12, pp. 13241–13261, Aug. 2023, doi: 10.1007/s11227-023-05197-0.

[26] V. Prajapati, “Enhancing Threat Intelligence and Cyber Defense through Big Data Analytics: A Review Study,” J. Glob. Res. Math. Arch., vol. 12, no. 4, 2025.

[27] A. S. Jaradat, M. M. Barhoush, and R. B. Easa, “Network intrusion detection system: Machine learning approach,” Indones. J. Electr. Eng. Comput. Sci., 2022, doi: 10.11591/ijeecs.v25.i2.pp1151-1158.

[28] N. K. Prajapati, “Federated Learning for Privacy-Preserving Cybersecurity: A Review on Secure Threat Detection,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 5, no. 4, pp. 520–528, Apr. 2025, doi: 10.48175/IJARSCT-25168.

[29] J. Jose and D. V. Jose, “Deep learning algorithms for intrusion detection systems in internet of things using CIC-IDS 2017 dataset,” Int. J. Electr. Comput. Eng., vol. 13, no. 1, p. 1134, Feb. 2023, doi: 10.11591/ijece.v13i1.pp1134-1141.

[30] K. N. I. Ara, T. Mithila, M. M. A. Rony, and I. Sarkar, “Engineering of AI-Powered Cyber Defense Tools to Protect Immigration Databases, Biometric Identity Systems, and Border-Control Infrastructure from Nation-State Attacks,” J. Comput. Sci. Inf. Technol., vol. 2, no. 2, pp. 47–58, Nov. 2025, doi: 10.61424/jcsit.v2i2.573.

[31] N. Omer, A. Samak, A. I. Taloba, and R. M. A. El-Aziz, “Cybersecurity Threats Detection Using Optimized Machine Learning Frameworks,” Comput. Syst. Sci. Eng., vol. 48, no. 1, pp. 77–95, 2024, doi: 10.32604/csse.2023.039265.

Downloads

Published

2026-02-13

Issue

Section

Articles

How to Cite

1.
Mohile A. Deep Learning-Based Threat Intelligence Framework for Proactive Cyberattack Detection and Mitigation . IJERET [Internet]. 2026 Feb. 13 [cited 2026 Mar. 13];7(1):146-53. Available from: https://ijeret.org/index.php/ijeret/article/view/464