adjustable to new attack forms. Further, federated
learning was incorporated with microservices
architecture, enabling the framework to work
reliably over distributed environments with the
assurance of data privacy and system performance.
The system not only improved capabilities
technically, but it also reinforced trust with the
application of explainable AI, which empowered
cyber teams to explain and validate autonomous
decision making. When tested in a realistic
experimental setup, its practical performance is quite
encouraging and confirms its identity as a game
changer in the modern cyber security.
This work provides not just a step forward
towards AI based security tools but also lays the
groundwork for tomorrow's systems where they are
self-improving, privacy-preserving, and
operationally autonomous. In a world where threats
are constantly evolving and increasing in both size
and complexity, these types of intelligent systems
will be critical to protecting the digital infrastructure
of enterprises, governments and critical infrastructure
worldwide.”
REFERENCES
Alazab, M., & Awajan, A. (2021). Artificial intelligence
and cybersecurity: The good, the bad, and the ugly.
IEEE Access, 9, 119173– 119184. https://doi.org/10.1
109/ACCESS.2021.310999
Ali, A., Al-Mhiqani, M. N., & Hussain, F. K. (2022). AI-
driven threat detection in cyber-physical systems: A
review. Future Generation Computer Systems, 127,
193–208. https://doi.org/10.1016/j.future.2021.09.006
Berman, D. S., Buczak, A. L., Chavis, J. S., & Corbett, C.
L. (2022). Machine learning for cyber defense and
attack detection. Cybersecurity, 5(1), 1–22.
https://doi.org/10.1186/s42400-021-00080-4
Chen, H., & Bridges, R. A. (2023). Automated anomaly
detection for cybersecurity using AI-driven approaches.
ACM Computing Surveys, 55(3), 1–36.
https://doi.org/10.1145/3485123
Dhruba, S. K., & Shetty, S. (2023). Cybersecurity threat
detection using deep learning techniques: A survey.
Journal of Cyber Security Technology, 7(1), 1–27.
https://doi.org/10.1080/23742917.2022.2120257
Gao, J., Wang, L., & Li, C. (2022). Real-time intrusion
detection based on hybrid deep learning models.
Security and Privacy, 5(2), e154. https://doi.org/10.10
02/spy2.154
Goodfellow, I., McDaniel, P., & Papernot, N. (2021).
Challenges of AI in cybersecurity. Communications of
the ACM, 64(8), 62– 71. https://doi.org/10.1145/3464
902
He, K., Qiu, M., & Li, Y. (2022). Reinforcement learning
for adaptive cybersecurity: Opportunities and
challenges. IEEE Transactions on Neural Networks and
Learning Systems, 33(6), 2658– 2671. https://doi.org/
10.1109/TNNLS.2021.3086976
Hussain, F., Hussain, R., Hassan, S. A., & Hossain, E.
(2021). Machine learning in cybersecurity:
Applications, challenges, and future directions. IEEE
Access, 9, 110232– 110254. https://doi.org/10.1109/A
CCESS.2021.3100120
Javaid, A. Y., Sun, W., Devabhaktuni, V., & Alam, M.
(2021). Cyber-attack detection using artificial neural
networks in smart grid applications. Electric Power
Systems Research, 189, 106621. https://doi.org/10.10
16/j.epsr.2020.106621
Kaur, H., & Singh, M. (2022). A comprehensive review on
deep learning techniques for intrusion detection.
Computer Science Review, 45, 100489. https://doi.or
g/10.1016/j.cosrev.2022.100489
Khan, R., & Ghafoor, K. Z. (2023). Intelligent
cybersecurity: The integration of AI in cyber threat
detection. Sensors, 23(2), 765. https://doi.org/10.339
0/s23020765
Kim, J., Park, Y., & Lee, J. (2021). An ensemble deep
learning model for DDoS attack detection. Computers
& Security, 108, 102372. https://doi.org/10.1016/j.cos
e.2021.102372
Kumar, A., & Sinha, A. (2024). Zero-day attack detection
using AI-based dynamic behavior analysis. Journal of
Network and Computer Applications, 225, 103988.
https://doi.org/10.1016/j.jnca.2023.103988
Li, Y., & Liu, Q. (2022). Federated learning for anomaly
detection in cybersecurity. IEEE Internet of Things
Journal, 9(4), 2762– 2774. https://doi.org/10.1109/JIO
T.2021.3098769
Lin, W., & Chen, C. (2023). Cybersecurity situational
awareness using NLP and AI tools. IEEE Transactions
on Information Forensics and Security, 18, 888–901.
https://doi.org/10.1109/TIFS.2022.3218873
Ma, Y., Li, J., & Zhang, P. (2023). AI-enabled malware
classification using transformer models. Journal of
Computer Virology and Hacking Techniques, 19, 15–
29. https://doi.org/10.1007/s11416-022-00389-2
Nguyen, T. T., & Armitage, G. (2021). A survey of AI in
threat hunting and SOC automation. Computer
Networks, 193, 108040. https://doi.org/10.1016/j.com
net.2021.108040
Patel, A., & Zaveri, M. (2024). AI-based threat intelligence
systems: Architecture and challenges. Cybersecurity,
6(1), 14. https://doi.org/10.1186/s42400-024-00142-x
Roy, A., & Pande, R. (2021). Artificial intelligence for
predictive cybersecurity: A comprehensive review.
IEEE Access, 9, 60859– 60880. https://doi.org/10.110
9/ACCESS.2021.3073857
Sharma, S., & Gupta, R. (2022). Deep adversarial
learning for detecting obfuscated malware. Pattern
Recognition Letters, 158, 56– 62. https://doi.org/10.1
016/j.patrec.2022.05.001
Singh, R., & Kapoor, R. (2023). Hybrid AI techniques for
cloud security threat detection. Journal of Cloud
Computing, 12, 25. https://doi.org/10.1186/s13677-
023-00365-9