CFP last date
20 November 2025
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2025

Submit your paper
Know more
Random Articles
Reseach Article

Autonomous Cyber Defense Agents: A Reinforcement Learning Approach to Real-Time Threat Mitigation

by Abdullahi Abubakar Girei, Felix Abraham, Abiola Olusola Majekodunmi, Jacob Alebiosu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 46
Year of Publication: 2025
Authors: Abdullahi Abubakar Girei, Felix Abraham, Abiola Olusola Majekodunmi, Jacob Alebiosu
10.5120/ijca2025925775

Abdullahi Abubakar Girei, Felix Abraham, Abiola Olusola Majekodunmi, Jacob Alebiosu . Autonomous Cyber Defense Agents: A Reinforcement Learning Approach to Real-Time Threat Mitigation. International Journal of Computer Applications. 187, 46 ( Oct 2025), 32-41. DOI=10.5120/ijca2025925775

@article{ 10.5120/ijca2025925775,
author = { Abdullahi Abubakar Girei, Felix Abraham, Abiola Olusola Majekodunmi, Jacob Alebiosu },
title = { Autonomous Cyber Defense Agents: A Reinforcement Learning Approach to Real-Time Threat Mitigation },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2025 },
volume = { 187 },
number = { 46 },
month = { Oct },
year = { 2025 },
issn = { 0975-8887 },
pages = { 32-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number46/autonomous-cyber-defense-agents-a-reinforcement-learning-approach-to-real-time-threat-mitigation/ },
doi = { 10.5120/ijca2025925775 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-10-23T00:17:57.822150+05:30
%A Abdullahi Abubakar Girei
%A Felix Abraham
%A Abiola Olusola Majekodunmi
%A Jacob Alebiosu
%T Autonomous Cyber Defense Agents: A Reinforcement Learning Approach to Real-Time Threat Mitigation
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 46
%P 32-41
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The exponential growth of cyber threats in the digital landscape necessitates the development of autonomous defense mechanisms capable of real-time threat detection and mitigation. This research presents a comprehensive examination of autonomous cyber defense agents utilizing reinforcement learning (RL) methodologies to address the dynamic nature of modern cyber threats. Through extensive analysis of current literature and empirical studies, this work demonstrates how RL-based agents can adapt to evolving attack patterns, make autonomous decisions, and provide scalable defense solutions for complex network infrastructures. The findings indicate that multi-agent reinforcement learning frameworks show significant promise in enhancing cybersecurity posture while reducing human intervention requirements in critical defense scenarios.

References
  1. Ajimatanrareje, G. A. (2024). Advancing E-Voting Security: Biometrics-Enhanced Blockchain for Privacy and VerifiAbility (BEBPV). American Journal of Innovation in Science and Engineering, 3(3), 88–93. https://doi.org/10.54536/ajise.v3i3.3876
  2. Burbano LSasahara HCardenas A(2025)Steerability of Autonomous Cyber-Defense Agents by Meta-Attackers2025 IEEE Conference on Artificial Intelligence (CAI)10.1109/CAI64502.2025.00194(1117-1124)Online publication date: 5-May-2025 https://doi.org/10.1109/CAI64502.2025.00194
  3. Dutta, A., Chatterjee, S., Bhattacharya, A., & Halappanavar, M. (2023). Deep reinforcement learning for cyber system defense under dynamic adversarial uncertainties. arXiv preprint. https://doi.org/10.48550/arXiv.2302.01595
  4. Foley, M., Hicks, C., Highnam, K., & Mavroudis, V. (2022). Autonomous Network Defence using Reinforcement Learning. Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. https://doi.org/10.1145/3488932.3527286
  5. Kolicic BCaron AMavroudis VHicks C(2024)Inherently Interpretable and Uncertainty-Aware Models for Online Learning in Cyber-Security Problems2024 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)10.1109/ACSACW65225.2024.00009(1-10)Online publication date: 9-Dec-2024 https://doi.org/10.1109/ACSACW65225.2024.00009
  6. Landolt, C. R., Würsch, C., Meier, R., Mermoud, A., & Jang-Jaccard, J. (2025). Multi-agent reinforcement learning in cybersecurity: From fundamentals to applications. arXiv preprint. https://doi.org/10.48550/arXiv.2505.19837
  7. Li, J. (2018). Cyber security meets artificial intelligence: a survey. Frontiers of Information Technology & Electronic Engineering, 19(12), 1462–1474. https://doi.org/10.1631/fitee.1800573
  8. Nguyen, T. T., & Reddi, V. J. (2021). Deep reinforcement learning for cyber security. IEEE Transactions on Neural Networks and Learning Systems, 34(8), 3779–3795. https://doi.org/10.1109/tnnls.2021.3121870
  9. Morris AProcter RWallbank C(2025)Evaluating Reinforcement Learning Agents for Autonomous Cyber DefenceApplied AI Letters10.1002/ail2.1256:3Online publication date: 27-Jun-2025, https://doi.org/10.1002/ail2.125
  10. Murphy, K. (2024). Reinforcement Learning: An Overview. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2412.05265
  11. Palmer, G., Parry, C., Harrold, D.J., & Willis, C. (2023). Deep Reinforcement Learning for Autonomous Cyber Defence: A Survey.
  12. Potteiger, N., Samaddar, A., Bergstrom, H., & Koutsoukos, X. (2024). Designing Robust Cyber-Defense Agents with Evolving Behavior Trees. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2410.16383
  13. Vyas SMavroudis VBurnap P(2025)Towards the Deployment of Realistic Autonomous Cyber Network Defence: A Systematic ReviewACM Computing Surveys10.1145/3729213Online publication date: 24-May-2025, https://dl.acm.org/doi/10.1145/3729213
  14. Raio, S., Corder, K., Parker, T. W., Shearer, G. G., Edwards, J. S., Thogaripally, M. R., Park, S. J., & Nelson, F. F. (2023). Reinforcement learning as a path to autonomous intelligent Cyber-Defense agents in vehicle platforms. Applied Sciences, 13(21), 11621. https://doi.org/10.3390/app132111621
  15. Singh, A. V., Rathbun, E., Graham, E., Oakley, L., Boboila, S., Oprea, A., & Chin, P. (2024). Hierarchical multi-agent reinforcement learning for cyber network defense. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2410.17351
  16. Tang, Y., Sun, J., Wang, H., Deng, J., Tong, L., & Xu, W. (2024). A method of network attack-defense game and collaborative defense decision-making based on hierarchical multi-agent reinforcement learning. Computers & Security, 142, 103871. https://doi.org/10.1016/j.cose.2024.103871
  17. Wang, Z., Wang, Y., Xiong, X., Ren, Q., & Huang, J. (2025). A novel framework for enhancing Decision-Making in autonomous cyber defense through graph embedding. Entropy, 27(6), 622. https://doi.org/10.3390/e27060622
  18. Wang, W., Sun, D., Jiang, F., Chen, X., & Zhu, C. (2022). Research and Challenges of Reinforcement Learning in Cyber Defense Decision-Making for Intranet Security. Algorithms, 15(4), 134. https://doi.org/10.3390/a15040134.
Index Terms

Computer Science
Information Sciences

Keywords

Autonomous cyber defense reinforcement learning multi-agent systems threat mitigation cybersecurity artificial intelligence