Wiley’s Internet Technology Letters Published Research on Generative AI for Adaptive Threat Hunting

Generative AI research for adaptive threat hunting

Recently, we published a research piece in Wiley’s Internet Technology Letters on highlighting the importance of Generative (GenAI) for revolutionizing the adaptive threat hunting process.
Generative AI in cyber defense article – Internet Technology Letters
Our findings suggest that GenAI, when used in conjunction with existing security tools, can significantly enhance threat intelligence and automate security reporting. This research was conducted in collaboration with Dr. Sherali Zeadally, professor at the University of Kentucky.

GenAI is not just a theoretical concept; it’s a game-changer in the field of cybersecurity. By transcending the limitations of traditional, rule-based AI models, GenAI, with its advanced transformer architectures, such as ChatGPT and Gemini, can dynamically adapt to evolving threats. This adaptability enables it to significantly enhance threat intelligence, automate security reporting, and perform more precise and adaptive risk assessments. By analyzing real-time attack patterns, security alerts, and emerging cyber threats, GenAI enables organizations to develop proactive and intelligent cyber defense strategies, which are crucial for detecting sophisticated tactics and zero-day vulnerabilities that often evade conventional security measures.

GenAI’s capabilities extend far beyond what traditional cybersecurity tools, such as intrusion detection systems (IDSs) and secure web gateways (SWGs), can offer. It continuously learns and evolves in response to emerging attacker techniques by extracting deep security insights from vast datasets, thereby instilling confidence in its ability to enable predictive threat modeling. Furthermore, GenAI enhances decision-making by generating tailored security recommendations and conducting advanced linguistic analysis of adversarial communications. Its capacity to simulate attack scenarios, foresee evolving threats, and automate complex security responses makes it an indispensable tool in combating the rapidly changing landscape of modern cyber threats.

Our research presents a comprehensive adaptive threat hunting enhancement model utilizing GenAI. We cover not only the model itself but also its design considerations and real-world use cases, providing a thorough understanding of its potential and future considerations.

Read the complete research paper here

About the author

Aditya K SoodAditya K Sood
Aditya K Sood (Ph.D) is the VP of Security Engineering and AI Strategy at Aryaka.. With more than 16 years of experience, he provides strategic leadership in information security, covering products and infrastructure. Dr. Sood is interested in Artificial Intelligence (AI), cloud security, malware automation and analysis, application security, and secure software design. He has authored several papers for various magazines and journals, including IEEE, Elsevier, Crosstalk, ISACA, Virus Bulletin, and Usenix. He has been an active speaker at industry conferences and presented at Blackhat, DEFCON, HackInTheBox, RSA, Virus Bulletin, OWASP, and many others. Dr. Sood obtained his Ph.D. in Computer Sciences from Michigan State University. Dr. Sood is also an author of the "Targeted Cyber Attacks" and “Empirical Cloud Security” books. He held positions such as Senior Director of Threat Research and Security Strategy, Head (Director) of Cloud Security, Chief Architect of Cloud Threat Labs, Lead Architect and Researcher, and others while working for companies such as F5 Networks, Symantec, Blue Coat, Elastica, and KPMG.