International Journal of Cyber Threat Intelligence and Secure Networking

  1. Home
  2. Archives
  3. Vol. 2 No. 10 (2025): Volume 02 Issue 10
  4. Articles
International Journal of Cyber Threat Intelligence and Secure Networking

Article Details Page

From Reactive to Predictive: A Framework for Integrating Threat Intelligence with SIEM for Proactive Threat Hunting

Authors

  • Dr. Alistair C. Finch Centre for Cybersecurity Research, King's College London, London, United Kingdom

DOI:

https://doi.org/10.55640/

Keywords:

Proactive Cyber Defense, Threat Hunting, Threat Intelligence

Abstract

Purpose: Traditional Security Information and Event Management (SIEM) systems, while foundational to security operations, primarily function in a reactive capacity, generating high volumes of alerts with limited contextual data. This reactive posture is often insufficient against sophisticated, persistent cyber threats. This paper addresses this critical gap by proposing a novel framework for augmenting SIEM with Cyber Threat Intelligence (CTI) to enable a predictive and proactive cyber defense strategy centered on threat hunting.

Methodology: This research synthesizes existing literature on SIEM, CTI, and threat hunting to develop the Intelligence-Augmented SIEM (IA-SIEM) framework. The proposed methodology is conceptual, centered on a dynamic Threat Knowledge Graph that is continuously enriched by external intelligence and internal logs. This enriched data fuels a two-phase process: (1) Predictive Threat Modeling, which uses the graph to generate and prioritize hunting hypotheses; and (2) Guided Threat Hunting, which provides analysts with a structured workflow to investigate these hypotheses and feeds findings back into the system. The framework’s efficacy is conceptualized through a case study simulating an Advanced Persistent Threat (APT).

Findings: Application of the IA-SIEM framework is projected to yield significant improvements over traditional security models. Key results include a marked reduction in Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR), a substantial decrease in alert fatigue and false positives, and an enhanced capability to proactively identify and neutralize previously undetectable, low-and-slow attack behaviors. The framework facilitates a shift from indicator-based alerting to intelligence-driven, hypothesis-led investigations.

Conclusion: The IA-SIEM framework offers a structured, actionable pathway for organizations to evolve their cyber defense capabilities from a reactive to a predictive posture. By systematically integrating threat intelligence at the core of the detection and response process, security teams can transition to proactive threat hunting, enabling them to anticipate and neutralize threats before significant impact occurs.

References

Wei, R., Cai, L., Yu, A., & Meng, D. (2021). DeepHunter: A graph neural network based approach for robust cyber threat hunting. arXiv preprint, arXiv:2104.09806.

Bienzobas, Á. C., & Sánchez Macián, A. (2023). Threat Trekker: An approach to cyber threat hunting. arXiv preprint, arXiv:2310.04197.

Mavroeidis, V., & Jøsang, A. (2021). Data driven threat hunting using Sysmon. arXiv preprint, arXiv:2103.15194.

Gao, P., Liu, X., Choi, E., Ma, S., Yang, X., & Song, D. (2022). ThreatKG: An AI powered system for automated open source cyber threat intelligence gathering. arXiv preprint, arXiv:2212.10388.

“Proactive threat hunting to detect persistent behaviour based attacks.” (2024). Computers & Security, article in press.

“Threat Hunting Use Cases: Integration with SIEM and real time enrichment.” (2024). Hunt.io.

Bitsight. (2024). SANS CTI Survey 2024: Threat hunting now top use case. Bitsight via SANS blog.

Brandefense. (2024). The benefits of integrating threat intelligence with SIEM solutions. bluevoyant.com.

CyberProof. (2024). What is proactive threat hunting? cyberproof.com.

StartupDefense. (2024). Threat hunting: A comprehensive guide to proactive cyber defense. startupdefense.io.

SecureITConsult. (2024). How intelligence data drives proactive threat hunting. secureitconsult.com.

SearchInform. (2024). SIEM threat hunting: Comprehensive guide. searchinform.com.

Bitsight. (2025). The role of threat intelligence in threat hunting. bitsight.com.

BlueVoyant. (2024). Threat intelligence: Complete guide to process and technology. bluevoyant.com.

CyberMaxx. (2025). The art of proactive threat hunting: A deeper dive. cybermaxx.com.

ChaosSearch. (2024). Threat hunting frameworks and methodologies: An introductory guide. chaossearch.io.

Softcat. (2024). The role of threat intelligence in proactive cyber defence. softcat.com.

Filigran. (2024). Leverage threat intelligence for proactive threat hunting. filigran.io.

Trellix. (2025). Threat intelligence and threat hunting: Why you need both. trellix.com.

“Threat intelligence platform” (2024). Wikipedia entry.

“Threat hunting” (2025). Wikipedia entry.

“Proactive cyber defence.” (2025). Wikipedia entry.

LevelBlue. (2024). OSSIM: Open Source Security Information Management. Wikipedia entry.

“Network detection and response (NDR).” (2025). Wikipedia entry.

PricewaterhouseCoopers. (2023). Proactive cyber defence and detection. Wikipedia entry.

Downloads

Published

2025-10-01

How to Cite

From Reactive to Predictive: A Framework for Integrating Threat Intelligence with SIEM for Proactive Threat Hunting. (2025). International Journal of Cyber Threat Intelligence and Secure Networking, 2(10), 1-10. https://doi.org/10.55640/

How to Cite

From Reactive to Predictive: A Framework for Integrating Threat Intelligence with SIEM for Proactive Threat Hunting. (2025). International Journal of Cyber Threat Intelligence and Secure Networking, 2(10), 1-10. https://doi.org/10.55640/

Similar Articles

1-10 of 17

You may also start an advanced similarity search for this article.