IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

A UNIFIED FRAMEWORK FOR ADVERSARIAL THREAT DETECTION AND ZERO-DAY MITIGATION IN ENTERPRISE NETWORKS

AUTHORS:
Danish Iqbal
Mentor
Affiliation
Department of Information Technology Noida Institute of Engineering and Technology
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

The resilience of enterprise cybersecurity infrastruc- tures depends on the ability to detect and neutralize adversarial threats across heterogeneous networks. This paper presents a structured analysis of two distinct cyberattack categories: Network-level Intrusion Events (NIE), encompassing discrete, high-volume attacks; and Behavioral Exploitation Chains (BEC), involving multi-stage, low-footprint lateral movement and persis- tent compromise. We develop analytical threat models grounded in graph-theoretic propagation and evaluate architectural limits on adversarial evasion. Furthermore, we propose a multi-layered detection architecture that integrates ensemble machine learning, LSTM-based behavioral sequence modeling, graph-theoretic lat- eral movement analysis, and cryptographic provenance tracking. Our analysis explores detection complexity bounds and the convergence properties of behavioral baselines. Ultimately, this work contributes a structured taxonomy and an analytically grounded framework to advance resilient enterprise network defense.

Keywords
Article Metrics
Article Views
41
PDF Downloads
2
HOW TO CITE
APA

MLA

Chicago

Copy

Iqbal, D. (2026). A Unified Framework for Adversarial Threat Detection and Zero-Day Mitigation in Enterprise Networks. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.356

Iqbal, Danish. "A Unified Framework for Adversarial Threat Detection and Zero-Day Mitigation in Enterprise Networks." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.356.

Iqbal, Danish. "A Unified Framework for Adversarial Threat Detection and Zero-Day Mitigation in Enterprise Networks." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.356.

References
1.Debar, M. Dacier, and A. Wespi, “Towards a taxonomy of intrusion- detection systems,” Computer Networks, vol. 31, no. 8, pp. 805–822, 1999.

2.Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the kdd cup 99 data set,” in Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, 2009, pp. 1–6.

3.Shen, E. Mariconti, P. A. Vervier, and G. Stringhini, “Tiresias: Predicting security events through deep learning,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, pp. 592–605.

4.Sharma and M. Kaliyar, “Ransomware-as-a-service: Evolution and mitigation strategies in enterprise environments,” IEEE Access, vol. 11,34 182–34 198, 2023.

5.European Parliament and Council, “Regulation (eu) 2016/679 of the european parliament and of the council,” Official Journal of the European Union, 2016.

6.National Institute of Standards and Technology, “Cybersecurity frame- work version 2.0,” NIST, Tech. Rep. NIST CSWP 29, 2024.

7.International Organization for Standardization, “Iso/iec 27001:2022 in- formation security, cybersecurity and privacy protection,” ISO, Tech. , 2022.

8.Moustafa and J. Slay, “Unsw-nb15: a comprehensive data set for network intrusion detection systems,” in 2015 Military Communications and Information Systems Conference (MilCIS). IEEE, 2015, pp. 1–6.

9.Breiman, “Random forests,” Machine Learning, vol. 45, pp. 5–32,2001.

10.H. Friedman, “Greedy function approximation: a gradient boosting machine,” Annals of Statistics, vol. 29, no. 5, pp. 1189–1232, 2001.
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
TO Evaluate Antimicrobial Activity of Mangifera Indica Bark Extract
string(13) "Lavanya Patil" Patil, L.et al.
(2026)
DOI: 10.55041/ijsmt.v2i4.509
A Critical Review of Ayurvedic Management of Breast Cancer with Special Reference to Rasayana and Bhasma Therapy
string(17) "Dr Trupti Naikare" Naikare, D. T.
(2026)
DOI: 10.55041/ijsmt.v2i4.534
Social Media Addiction Among Early Adults: A Mini Empirical Study
string(8) "Sanjay.K" Sanjay.K,
(2026)
DOI: 10.55041/ijsmt.v2i3.028
Scroll to Top