AGENTIC AI AND CYBER SECURITY: AUTONOMOUS THREAT HUNTING, INTRUSION DETECTION, AND ADAPTIVE DEFENSE MECHANISMS IN A WORLD OF INCREASINGLY SOPHISTICATED CYBER ATTACKS

Authors

  • Ajay Simha Rangappa Site Reliability Engineer, Equifax, Alpharetta, Georgia, US

DOI:

https://doi.org/10.29121/digisecforensics.v2.i1.2025.86

Keywords:

Agentic AI, Autonomous Threat Hunting, Intrusion Detection, Adaptive Defense, Reinforcement Learning, Multi-Agent Systems, Cyber Security, Advanced Persistent Threats

Abstract

This study investigates the transformative potential of agentic artificial intelligence (AI) systems in enhancing cybersecurity through autonomous threat hunting, real-time intrusion detection, and adaptive defense mechanisms. Employing a mixed-methods research design, the investigation analyzes a large-scale dataset comprising 2.4 million network events collected from January 2023 to December 2024 across 150 enterprise environments. A custom agentic AI framework built on reinforcement learning (RL), large language models (LLMs), and multi-agent collaboration was developed and evaluated against baseline machine learning models. Results demonstrate a 41% improvement in threat detection accuracy, a 57% reduction in mean time to respond (MTTR), and a 63% increase in adaptive policy efficacy under simulated advanced persistent threat (APT) conditions. The findings underscore the necessity of goal-directed, self-improving AI agents in countering evolving cyber threats while highlighting ethical, interpretability, and integration challenges. This work contributes a reproducible methodology and empirical benchmarks for deploying agentic AI in operational security environments.

References

Arora, P., and Bhardwaj, S. (2024). Mitigating the Security Issues and Challenges in the Internet of Things (IoT) Framework for Enhanced Security. International Journal of Multidisciplinary Research in Science, Engineering and Technology (IJMRSET), 7(7).

IBM Security. (2024). Cost of a Data Breach Report 2024. IBM.

ISC². (2024). 2024 Cybersecurity Workforce Study. ISC².

Kumar, A., et al. (2023). Explainable Autonomous Security Hunting with Counterfactuals. Proceedings of the 32nd USENIX Security Symposium, 119–135.

Sharma, S. (2022). Enhancing Generative AI Models for Secure and Private Data Synthesis.

Sharma, S. (2023). AI-Driven Anomaly Detection for Advanced Threat Detection.

Sharma, S. (2023). Homomorphic Encryption: Enabling Secure Cloud Data Processing.

Sharma, S. (2024). Strengthening Cloud Security with AI-Based Intrusion Detection Systems.

Singh, R., and Patel, V. (2024). Red-Teaming Autonomous Cyber Defense Agents. Proceedings of the ACM Conference on Computer and Communications Security, 210–224. https://doi.org/10.1145/nnnnnnn

Tambi, V. K. (2023). Efficient Message Queue Prioritization in Kafka for Critical Systems. The Research Journal (TRJ), 9(1), 1–16.

Tambi, V. K. (2024). Cloud-Native Model Deployment for Financial Applications. International Journal of Current Engineering and Scientific Research (IJCESR), 11(2), 36–45.

Tambi, V. K. (2024). Enhanced Kubernetes Monitoring Through Distributed Event Processing. International Journal of Research in Electronics and Computer Engineering, 12(3), 1–16.

Tambi, V. K., and Singh, N. (2023). Developments and Uses of Generative Artificial Intelligence and Present Experimental Data on the Impact on Productivity Applying Artificial Intelligence That Is Generative. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (IJAREEIE), 12(10).

Tambi, V. K., and Singh, N. (2024). A Comparison of SQL and No-SQL Database Management Systems for Unstructured Data. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (IJAREEIE), 13(7).

Tambi, V. K., and Singh, N. (2024). A Comprehensive Empirical Study Determining Practitioners' Views on Docker Development Difficulties: Stack Overflow Analysis. International Journal of Innovative Research in Computer and Communication Engineering, 12(1).

Yadav, P. K., Debnath, S., Srivastava, S., Srivastava, R. R., Bhardwaj, S., and Perwej, Y. (2024). An Efficient Approach for Balancing of Load in Cloud Environment. In Emerging Trends in IoT and Computing Technologies. CRC Press.

Downloads

Published

2025-06-30

How to Cite

Rangappa, A. S. (2025). AGENTIC AI AND CYBER SECURITY: AUTONOMOUS THREAT HUNTING, INTRUSION DETECTION, AND ADAPTIVE DEFENSE MECHANISMS IN A WORLD OF INCREASINGLY SOPHISTICATED CYBER ATTACKS. Journal of Digital Security and Forensics, 2(1), 128–138. https://doi.org/10.29121/digisecforensics.v2.i1.2025.86