IRSDA: An Agent-Orchestrated Framework for Enterprise Intrusion Response
By: Damodar Panigrahi , Raj Patel , Shaswata Mitra and more
Potential Business Impact:
Automates computer defense against hackers.
Modern enterprise systems face escalating cyber threats that are increasingly dynamic, distributed, and multi-stage in nature. Traditional intrusion detection and response systems often rely on static rules and manual workflows, which limit their ability to respond with the speed and precision required in high-stakes environments. To address these challenges, we present the Intrusion Response System Digital Assistant (IRSDA), an agent-based framework designed to deliver autonomous and policy-compliant cyber defense. IRSDA combines Self-Adaptive Autonomic Computing Systems (SA-ACS) with the Knowledge guided Monitor, Analyze, Plan, and Execute (MAPE-K) loop to support real-time, partition-aware decision-making across enterprise infrastructure. IRSDA incorporates a knowledge-driven architecture that integrates contextual information with AI-based reasoning to support system-guided intrusion response. The framework leverages retrieval mechanisms and structured representations to inform decision-making while maintaining alignment with operational policies. We assess the system using a representative real-world microservices application, demonstrating its ability to automate containment, enforce compliance, and provide traceable outputs for security analyst interpretation. This work outlines a modular and agent-driven approach to cyber defense that emphasizes explainability, system-state awareness, and operational control in intrusion response.
Similar Papers
RIDAS: A Multi-Agent Framework for AI-RAN with Representation- and Intention-Driven Agents
Networking and Internet Architecture
Makes phones connect better with smart planning.
RIDAS: A Multi-Agent Framework for AI-RAN with Representation- and Intention-Driven Agents
Networking and Internet Architecture
Makes phone networks smarter for more users.
Adaptive Intrusion Detection System Leveraging Dynamic Neural Models with Adversarial Learning for 5G/6G Networks
Cryptography and Security
Protects phone networks from new online attacks.