| Issue |
ITM Web Conf.
Volume 85, 2026
Intelligent Systems for a Sustainable Future (ISSF 2026)
|
|
|---|---|---|
| Article Number | 02004 | |
| Number of page(s) | 6 | |
| Section | Cybersecurity, Blockchain & Threat Intelligence | |
| DOI | https://doi.org/10.1051/itmconf/20268502004 | |
| Published online | 09 April 2026 | |
A Real-Time Threat Intelligence System for Comprehensive Cyber Attack Detection and Mitigation Using Explainable AI
1 Dept of CSE, Sathyabama Institute of Science and Technology, Chennai, India
2 Dept of CSE, Sathyabama Institute of Science and Technology, Chennai, India
3 Dept of CSE, Sathyabama Institute of Science and Technology, Chennai, India
This email address is being protected from spambots. You need JavaScript enabled to view it.
This email address is being protected from spambots. You need JavaScript enabled to view it.
This email address is being protected from spambots. You need JavaScript enabled to view it.
Abstract
This study proposes a comprehensive and agile method for detecting and preventing cyber threats through a collection of AI-XAI Techniques. Furthermore, this research presents a set of ML models employed by an organization to monitor Cyber attacks: DDoS, Malware, Phishing, Brute Force, Anomaly. The implementation of XAI Methods (SHAP & LIME) allows users to see the rationale behind each ML-based cyber detection model generated in real-time which not only improves the credibility of the model itself but also provides end-users with easier ways to interpret model outputs. Additionally, Adversarial Robustness Testing is incorporated to assess the effectiveness of these defence mechanisms against attackers attempting to manipulate AI models for nefarious purposes. Combining signature and anomaly detection enables organizations to improve accuracy, coverage, and efficiency in terms of monitoring systems, as they will be automatically generating alerts without delay. The proposed framework provides a unique solution to existing challenges for real-time monitoring systems, including the provision of robust real-time threat intelligence analysis capabilities and the ability to scale with an organization’s cyber threat environment.
© The Authors, published by EDP Sciences, 2026
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

