Department of Computer Science, Texas Southern University, Texas, USA.
International Journal of Science and Research Archive, 2025, 14(03), 270-285
Article DOI: 10.30574/ijsra.2025.14.3.0339
Received on 23 December 2024; revised on 04 March 2025; accepted on 06 March 2025
Cyber threats are evolving at an unprecedented pace, challenging organizations to stay ahead of sophisticated adversaries. Traditional threat research methods often require extensive manual effort, leading to delays in identifying and mitigating threats. This paper proposes an AI-Driven Threat Intelligence System (AIDTIS), a theoretical approach that leverages large language models (LLMs) to automate and enhance threat research and detection development. Our simulations and theoretical models suggest that such a system could significantly reduce threat research time, improve detection accuracy, and streamline security operations. The proposed solution demonstrates potential for efficiency improvement, potentially cutting analysis time from 8 hours to just 1 hour per report while maintaining high-quality threat intelligence and detection outputs.
Moreover, this research highlights the urgency of adopting AI-driven threat research across the broader cybersecurity landscape, particularly in the United States. With rising cyber threats targeting critical infrastructure, financial systems, and government networks, the proposed AIDTIS provides a scalable model for national security initiatives, demonstrating how AI-driven intelligence could revolutionize threat detection and mitigation.
Threat Detection; Large Language Models; Cybersecurity Automation; Threat Research; Security Operations; U.S. National Security; AI-Driven Threat Intelligence; Machine Learning in Cybersecurity
Preview Article PDF
Emmanuel Joshua, John Do and Rushil Patel. AI-Driven Threat Intelligence System (AIDTIS): Leveraging large language models for automated threat research and detection development. International Journal of Science and Research Archive, 2025, 14(03), 270-285. Article DOI: https://doi.org/10.30574/ijsra.2025.14.3.0339.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0