A UNIFIED FRAMEWORK FOR ADVERSARIAL THREAT DETECTION AND ZERO-DAY MITIGATION IN ENTERPRISE NETWORKS
The resilience of enterprise cybersecurity infrastruc- tures depends on the ability to detect and neutralize adversarial threats across heterogeneous networks. This paper presents a structured analysis of two distinct cyberattack categories: Network-level Intrusion Events (NIE), encompassing discrete, high-volume attacks; and Behavioral Exploitation Chains (BEC), involving multi-stage, low-footprint lateral movement and persis- tent compromise. We develop analytical threat models grounded in graph-theoretic propagation and evaluate architectural limits on adversarial evasion. Furthermore, we propose a multi-layered detection architecture that integrates ensemble machine learning, LSTM-based behavioral sequence modeling, graph-theoretic lat- eral movement analysis, and cryptographic provenance tracking. Our analysis explores detection complexity bounds and the convergence properties of behavioral baselines. Ultimately, this work contributes a structured taxonomy and an analytically grounded framework to advance resilient enterprise network defense.
Iqbal, D. (2026). A Unified Framework for Adversarial Threat Detection and Zero-Day Mitigation in Enterprise Networks. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.356
Iqbal, Danish. "A Unified Framework for Adversarial Threat Detection and Zero-Day Mitigation in Enterprise Networks." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.356.
Iqbal, Danish. "A Unified Framework for Adversarial Threat Detection and Zero-Day Mitigation in Enterprise Networks." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.356.
2.Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the kdd cup 99 data set,” in Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, 2009, pp. 1–6.
3.Shen, E. Mariconti, P. A. Vervier, and G. Stringhini, “Tiresias: Predicting security events through deep learning,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, pp. 592–605.
4.Sharma and M. Kaliyar, “Ransomware-as-a-service: Evolution and mitigation strategies in enterprise environments,” IEEE Access, vol. 11,34 182–34 198, 2023.
5.European Parliament and Council, “Regulation (eu) 2016/679 of the european parliament and of the council,” Official Journal of the European Union, 2016.
6.National Institute of Standards and Technology, “Cybersecurity frame- work version 2.0,” NIST, Tech. Rep. NIST CSWP 29, 2024.
7.International Organization for Standardization, “Iso/iec 27001:2022 in- formation security, cybersecurity and privacy protection,” ISO, Tech. , 2022.
8.Moustafa and J. Slay, “Unsw-nb15: a comprehensive data set for network intrusion detection systems,” in 2015 Military Communications and Information Systems Conference (MilCIS). IEEE, 2015, pp. 1–6.
9.Breiman, “Random forests,” Machine Learning, vol. 45, pp. 5–32,2001.
10.H. Friedman, “Greedy function approximation: a gradient boosting machine,” Annals of Statistics, vol. 29, no. 5, pp. 1189–1232, 2001.