[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Volume 4, Issue 9 (12-2025) ::
3 2025, 4(9): 36-41 Back to browse issues page
AI-Based Cyber Threat Intelligence: Automating Threat Discovery and Analysis
Mahdi Varmaziyar
Abstract:   (67 Views)
In recent years, the exponential growth of cyber threats and the increasing complexity of attacks have highlighted the urgent need for developing automated, AI-based threat intelligence systems. This review paper examines the frameworks, methods, and key challenges in automating threat discovery and analysis processes, elucidating the role of machine learning, deep learning, and graph models in improving the accuracy and speed of threat detection. Results from a systematic literature review indicate that integrating multi-source data with deep learning models—such as CNNs, LSTMs, and GNNs—can enhance the detection accuracy of multi-stage attacks. Moreover, the application of Explainable AI (XAI) increases the transparency of model decisions, fosters trust among security analysts, and enables effective human–machine interaction in operational environments.
Keywords: Cyber Threat Intelligence, Artificial Intelligence, Automated Threat Detection, Explainable AI (XAI).
Full-Text [PDF 403 kb]   (53 Downloads)    
Type of Study: Research | Subject: Special
Received: 2025/10/26 | Accepted: 2025/12/1 | Published: 2025/12/1
References
1. M. Mashfiquer Rahman et al., “AI integration in cybersecurity software: Threat detection and response,” IEEE Access, 2025
2. B. Xu et al., “ProcSAGE: an efficient host threat detection method based on graph representation learning,” Cybersecurity, 2024.
3. M. M. Shirmohammadi, AI Unboxed: Tools & Techniques for the Future, 1st ed., vol. 1. [Online]. Available: https://www.researchgate.net/publication/389659219_AI_UNBOXED_TOOLS_TECHNIQUES_FOR_THE_FUTURE#fullTextFileContent, Mar. 2025, p. 144.
4. M. Ma et al., “ActMiner: Applying Causality Tracking and Increment Aligning for Graph-based Cyber Threat Hunting,” 2025
5. M. Zhong, M. Lin, C. Zhang, Z. Xu, "A Survey on Graph Neural Networks for Intrusion Detection Systems: Methods, Trends and Challenges , 2024
6. Pinto, L.-C. Herrera, Y. Donoso, J. A. Gutiérrez, "Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure. 2023
7. Z. Sun, A. M. H. Teixeira, S. Toor, "GNN-IDS: Graph Neural Network based Intrusion Detection System , Vienna, Austria, 2024
8. J. Huang, "Improved Intrusion Detection Based on Hybrid Deep Learning Models and Federated Learning 2024
Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Varmaziyar M. AI-Based Cyber Threat Intelligence: Automating Threat Discovery and Analysis. 3 2025; 4 (9) :36-41
URL: http://jiis.iauh.ac.ir/article-1-56-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 4, Issue 9 (12-2025) Back to browse issues page
فصلنامه سیستم های اطلاعاتی هوشمند Intelligent Information Systems Journal
Persian site map - English site map - Created in 0.05 seconds with 37 queries by YEKTAWEB 4735