| Issue |
ITM Web Conf.
Volume 85, 2026
Intelligent Systems for a Sustainable Future (ISSF 2026)
|
|
|---|---|---|
| Article Number | 02002 | |
| Number of page(s) | 7 | |
| Section | Cybersecurity, Blockchain & Threat Intelligence | |
| DOI | https://doi.org/10.1051/itmconf/20268502002 | |
| Published online | 09 April 2026 | |
An Adaptive Multi-Engine Cyber Defense with Intelligent Deception and Real-Time Threat Mitigation
1 Department of CSBS, Rajalakshmi Engineering College, Chennai, India
2 Department of CSBS, Rajalakshmi Engineering College, Chennai, India
3 Department of CSBS, Rajalakshmi Engineering College, Chennai, India
This email address is being protected from spambots. You need JavaScript enabled to view it.
This email address is being protected from spambots. You need JavaScript enabled to view it.
This email address is being protected from spambots. You need JavaScript enabled to view it.
Abstract
Phantom flow is cyber threat detection and response system that uses the concept of adaptive intrusion detection and response to address the dynamic nature of cyber threats. This system uses a combination of machine learning and deception to address the dynamic nature of cyber threats. This system collects information from the internet, API processes, user processes, credential processes, database queries, and other devices that are connected to it. This system uses advanced mathematical techniques like Count-Min Sketch, HyperLogLog, Markov Chain models, and statistical techniques like EWMA and MAD for the classification of attacks. This system uses a reinforcement learning-based decision engine to determine the best course of action to take in responding to the cyber attacks. This system uses graph technology and the Neo4j graph database to detect complex attacks like lateral movement and multi-vector attacks. This system uses the CICIDS2017 and CICIDS2018 datasets to evaluate this system. This system can attain a level of 98% accuracy in detecting attacks while at the same time ensuring that false positives are minimized and the response time to the attacks is less than 10 milliseconds. This system uses peer-to-peer communication and can proactively improve security to prevent future attacks.
© The Authors, published by EDP Sciences, 2026
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

