AI-Driven Cyber Threat Intelligence Systems: A National Framework for Proactive Defense Against Evolving Digital Warfare
DOI:
https://doi.org/10.22399/ijcesen.3793Keywords:
Artificial Intelligence, Cyber Threat Intelligence Systems, National Cybersecurity Framework, Digital Warfare, Threat Detection Accuracy, Cybersecurity ResilienceAbstract
The current study suggests the national framework based on the concept of AI-enabled cyber threat intelligence systems. The increased risk of digital warfare and the shortcomings of the traditional patterns of cybersecurity. The use of artificial intelligence in the early warning of such threats, real-time response, and superior data analysis. It is a crucial concern to national security. The study will determine the contribution of AI-driven CTIS to the improvement of cyber defense capabilities in government and defense. It is critical infrastructure sectors and determines factors that affect these capabilities. The descriptive research design was used, and information was gathered using structured surveys that were administered to 300 cybersecurity practitioners in large and small firms. The findings indicate the maturity of an AI system, and the greater the level of automation in detecting the threat, the better the detection accuracy and the faster the incident response time. A multivariate regression model revealed that there was a positive relationship regarding the independent variables and the effectiveness of AI-CTIS, checking in with an R² = 0.76 and a p < 0.001. Inter-agency cooperation and learning of workforce skills were defined as the most crucial ingredients in the streamlining of CTIS performance. The research project has not overlooked some of the major challenges, which include the failure to standardize, poor policy infrastructure, and interoperability. The national cybersecurity approach is the proactive defense strategy. Companies remain digitally resilient in the long-term perspective. It is high quotients of targeted cyber threats that are changing in detail and quantity.
References
[1] Goffer, M. A., et al. (2025). Cybersecurity and supply chain integrity: Evaluating the economic consequences of vulnerabilities in U.S. infrastructure. Journal of Management World, 2025(2), 233–243. https://doi.org/10.53935/jomw.v2024i4.907
[2] Kaur, J., Hasan, S. N., Orthi, S. M., Miah, M. A., Goffer, M. A., Barikdar, C. R., & Hassan, J. (2023). Advanced cyber threats and cybersecurity innovation – Strategic approaches and emerging solutions. Journal of Computer Science and Technology Studies, 5(3), 112–121. https://doi.org/10.32996/jcsts.2023.5.3.9
[3] Goffer, M. A., Uddin, M. S., Kaur, J., Hasan, S. N., Barikdar, C. R., Hassan, J., … Hasan, R. (2025). AI-enhanced cyber threat detection and response advancing national security in critical infrastructure. Journal of Posthumanism, 5(3), 1667–1689. https://doi.org/10.63332/joph.v5i3.965
[4] Hasan, S. N., Kaur, H., Mohonta, S. C., Siddiqa, K. B., Kaur, J., Haldar, U., … Manik, M. M. T. G. (2025). The influence of artificial intelligence on data system security. International Journal of Computational and Experimental Science and Engineering, 11(3). https://doi.org/10.22399/ijcesen.3476
[5] Barikdar, C. R., Siddiqa, K. B., Miah, M. A., Sultana, S., Haldar, U., Rahman, H., … Hassan, J. (2025). MIS frameworks for monitoring and enhancing U.S. energy infrastructure resilience. Journal of Posthumanism, 5(5), 4327–4342. https://doi.org/10.63332/joph.v5i5.1907
[6] Hassan, J., Rahman, H., Haldar, U., Sultana, S., Rahman, M. M., Chakraborty, P., … Barikdar, C. R. (2025). Implementing MIS solutions to support the national energy dominance strategy. Journal of Posthumanism, 5(5), 4343–4363. https://doi.org/10.63332/joph.v5i5.1908
[7] Moniruzzaman, M., Islam, M. S., Mohonta, S. C., Adnan, M., Chy, M. A. R., Saimon, A. S. M., … Manik, M. M. T. G. (2025). Big data strategies for enhancing transparency in U.S. healthcare pricing. Journal of Posthumanism, 5(5), 3744–3766. https://doi.org/10.63332/joph.v5i5.1813
[8] Mahmud, F., Barikdar, C. R., Hassan, J., Goffer, M. A., Das, N., Orthi, S. M., … Hasan, R. (2025). AI-driven cybersecurity in IT project management: Enhancing threat detection and risk mitigation. Journal of Posthumanism, 5(4), 23–44. https://doi.org/10.63332/joph.v5i4.974
[9] Hasan, S. N., Hassan, J., Barikdar, C. R., Chakraborty, P., Haldar, U., Chy, M. A. R., … Kaur, J. (2023). Enhancing cybersecurity threat detection and response through big data analytics in management information systems. Fuel Cells Bulletin, 2023(12). https://doi.org/10.52710/fcb.137
[10] Hossin, M. E., Jahid, H., Chy, M. A. R., Hossain, S., Rozario, E., Khair, F. B., & Goffer, M. A. (2024). Harnessing business analytics in management information systems to foster sustainable economic growth through smart manufacturing and Industry 4.0. Educational Administration: Theory and Practice, 30(10), 730–739. https://doi.org/10.53555/kuey.v30i10.9643
[11] Goffer, M. A., Chakraborty, P., Rahman, H., Barikdar, C. R., Das, N., Hossain, S., & Hossin, M. E. (2024). Leveraging predictive analytics in management information systems to enhance supply chain resilience and mitigate economic disruptions. Educational Administration: Theory and Practice, 30(4), 11134–11144. https://doi.org/10.53555/kuey.v30i4.9641
[12] Sultana, S., Karim, F., Rahman, H., Chy, M. A. R., Uddin, M., Khan, M. N., Hossin, M. E., & Rozario, E. (2025). AI-augmented big data analytics for real-time cyber attack detection and proactive threat mitigation. International Journal of Computational and Experimental Science and Engineering, 11(3). https://doi.org/10.22399/ijcesen.3564
[13] Mohamed, N. Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms. Knowl Inf Syst 67, 6969–7055 (2025). https://doi.org/10.1007/s10115-025-02429-y
[14] Achuthan K, Ramanathan S, Srinivas S, Raman R., (2024). Advancing cybersecurity and privacy with artificial intelligence: current trends and future research directions. Front Big Data. 7:1497535. doi: 10.3389/fdata.2024.1497535. PMID: 39703783; PMCID: PMC11656524.
[15] Achuthan, K., Ramanathan, S., Srinivas, S., & Raman, R. (2024). Advancing cybersecurity and privacy with artificial intelligence: Current trends and future research directions. Frontiers in Big Data, 7, 1497535. https://doi.org/10.3389/fdata.2024.1497535
[16] Alsmadi, I., & Zarour, M. (2020). Cybersecurity skills training and workforce development: A survey. Computers & Security, 97, 101970. https://doi.org/10.1016/j.cose.2020.101970
[17] Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., & Marchetti, M. (2018). On the effectiveness of machine and deep learning for cyber security. In 2018 10th International Conference on Cyber Conflict (CyCon) (371–390). IEEE. https://doi.org/10.23919/CYCON.2018.8405026
[18] Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, 84, 317–331. https://doi.org/10.1016/j.patcog.2018.07.023
[19] Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176. https://doi.org/10.1109/COMST.2015.2494502
[20] Cheung, S., Skopik, F., & Settanni, G. (2019). Collaboration in cyber threat intelligence sharing: Practices, challenges and research opportunities. Computers & Security, 87, 101589. https://doi.org/10.1016/j.cose.2019.101589
[21] European Union Agency for Cybersecurity (ENISA). (2021). Artificial intelligence and cybersecurity: Threat landscape. ENISA. https://www.enisa.europa.eu/publications/artificial-intelligence-cybersecurity-threat-landscape
[22] Huang, L., Joseph, A. D., Nelson, B., Rubinstein, B. I., & Tygar, J. D. (2011). Adversarial machine learning. In Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence (43–58). ACM. https://doi.org/10.1145/2046684.2046692
[23] Mohamed, N. (2025). Artificial intelligence and machine learning in cybersecurity: A deep dive into state-of-the-art techniques and future paradigms. Knowledge and Information Systems, 67, 6969–7055. https://doi.org/10.1007/s10115-025-02429-y
[24] Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE Symposium on Security and Privacy (305–316). IEEE. https://doi.org/10.1109/SP.2010.11
[25] Ujcich, B. E., Sanders, W. H., & Campbell, R. H. (2020). Toward resilient cyber infrastructures: Artificial intelligence, machine learning, and security. ACM Computing Surveys, 53(1), 1–36. https://doi.org/10.1145/3372023
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.