Vol. 1 No. 1 (2026): January 2026
Artificial Intelligence : Technology

NeuroGuard-X: A LangGraph - Orchestrated Autonomous Cybersecurity Framework Integrating Graph-Based AI Tools, Multistage NLP, Hybrid ML Detection, and Generative AI Reasoning

Busireddy Seshakagari Haranadha Reddy
Enterprise Solutions Architect, Erie, PA, USA- 16506.

Published 2026-02-24

Keywords

  • Cybersecurity,
  • Graph-Based AI,
  • LangGraph, Autonomous AI Agents,
  • Hybrid ML,
  • Generative AI,
  • Threat Detection
  • ...More
    Less

How to Cite

Busireddy Seshakagari Haranadha Reddy. (2026). NeuroGuard-X: A LangGraph - Orchestrated Autonomous Cybersecurity Framework Integrating Graph-Based AI Tools, Multistage NLP, Hybrid ML Detection, and Generative AI Reasoning. Milestone Transactions on Artificial Intelligence, 1(1), 92–118. https://doi.org/10.5281/zenodo.18760236

Abstract

Cybersecurity threats have evolved from static malware to multi-stage AI-generated attacks capable of autonomously evading detection systems. Traditional signature-based and rule-Based systems fail to provide contextual reasoning, multi-event correlation, or real-time adaptive mitigation. This paper presents NeuroGuard-X, a next-generation autonomous cybersecurity framework that integrates graph-based AI tools, LangGraph multi-agent orchestration, multistage NLP fusion, traditional ML anomaly detection, and generative AI reasoning. Traditional ML models, including LSTM, Autoencoders, Graph Neural Networks (GNN), and XGBoost detects behavioral anomalies, whereas Generative AI models interpret, contextualize, and narrate threats into analyst-ready incident summaries. A graph-driven agentic architecture enables multi-step reasoning, attack-path reconstruction, and autonomous mitigation. Evaluated using CIC-IDS-2017, DARPA, MAWI, and a custom AI-augmented phishing dataset, NeuroGuard-X achieves 97.8% detection accuracy, 92.4% zero-day recall, 98.3% malicious email precision, and reduces SOC alert fatigue by 71%. The proposed system demonstrates that combining graph intelligence, hybrid ML, and LLM-based reasoning creates a powerful framework for modern cyber defense across digital payment and e-commerce ecosystems. Overall, NeuroGuard-X bridges the gap between accurate threat detection and trustworthy autonomous reasoning, enabling practical deployment in real-world security operations

References

  1. Jiang, L., Ryan, R., Li, Q., & Ferdosian, N. (2025). A survey of heterogeneous graph neural networks for cybersecurity anomaly detection (arXiv:2510.26307). arXiv.
  2. Biradar, J., Shah, S., & Naik, T. (2025). Attention augmented GNN RNN-attention models for advanced cybersecurity intrusion detection (arXiv:2510.25802). arXiv.
  3. Jahin, M. A., et al. (2025). CAGN-GAT fusion: A hybrid contrastive attentive graph neural network for network intrusion detection (arXiv:2503.00961). arXiv.
  4. Zhong, M. M., Lin, M., Zhang, C., & Xu, Z. (2024). A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges. Computers & Security, 141, 103821.
  5. Kotsakis, R., & Ougiaroglou, S. (2024). Knowledge graphs and semantic web tools in cyber threat intelligence: A systematic literature review. Journal of Cybersecurity and Privacy, 4(3), 518–545.
  6. Cybersecurity knowledge graphs. (2023). Knowledge and Information Systems, 65, 3511–3531.
  7. Wu, L., Tang, F., Zhao, M., & Li, Y. (2024). KGV: Integrating large language models with knowledge graphs for cyber threat intelligence credibility assessment. arXiv.
  8. LLM-TIKG: Threat intelligence knowledge graph construction utilizing large language model. (2024). Computers & Security, 145, 103999.
  9. Semantic knowledge graph framework for intelligent threat identification in IoT. (2025). Preprints.org.
  10. Zhou, A., Xu, X., Raghunathan, R., Lal, A., Guan, X., Yu, B., & Li, B. (2024). KnowGraph: Knowledge-enabled anomaly detection via logical reasoning on graph data (arXiv:2410.08390). arXiv.
  11. Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50.
  12. Lansky, J., Ali, S., Mohammadi, M., Majeed, M. K., Karim, S. H. T., Rashidi, S., Hosseinzadeh, M., & Rahmani, A. M. (2021). Deep learning-based intrusion detection systems: A systematic review. IEEE Access, 9, 101574–101599.
  13. Aminanto, E., & Kim, K. (2016). Deep learning in intrusion detection systems: An overview. In Proceedings of the 2016 International Research Conference on Engineering and Technology (IRCET). Higher Education Forum.
  14. Dasgupta, S., Piplai, A., Ranade, P., & Joshi, A. (2021). Cybersecurity knowledge graph improvement with graph neural networks. In Proceedings of the 2021 IEEE International Conference on Big Data (pp. 3290–3297). IEEE.
  15. He, H., Ji, Y., & Huang, H. H. (2022). Illuminati: Towards explaining graph neural networks for cybersecurity analysis. In Proceedings of the 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P) (pp. 74–89). IEEE.
  16. Bilot, T., El Madhoun, N., Al Agha, K., & Zouaoui, A. (2023). Graph neural networks for intrusion detection: A survey. IEEE Access, 11, 49114–49139.
  17. Dhakal, K. (2023). Log analysis and anomaly detection in log files with natural language processing techniques.
  18. Chourasiya, L., Khatri, S., Lilhore, U. K., Simaiya, S., Alroobaea, R., Baqasah, A. M., Alsafyani, M., & Khan, M. (2025). Advanced system log analyzer for anomaly detection and cyber forensic investigations using LSTM and transformer networks. Journal of Cloud Computing, 14(1), 60.
  19. Bertalan, V., & Aloise, D. (2023). Using transformer models and textual analysis for log parsing. In Proceedings of the 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE) (pp. 367–378). IEEE.
  20. Tihanyi, N., Ferrag, M. A., Jain, R., Bisztray, T., & Debbah, M. (2024). Cybermetric: A benchmark dataset based on retrieval-augmented generation for evaluating LLMs in cybersecurity knowledge. In Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience (CSR) (pp. 296–302). IEEE.
  21. Rahman, M., Piryani, K. O., Sanchez, A. M., Munikoti, S., De La Torre, L., Levin, M. S., Akbar, M., Hossain, M., Hasan, M., & Halappanavar, M. (2024). Retrieval augmented generation for robust cyber defense (Technical Report). Pacific Northwest National Laboratory (PNNL).
  22. Singh, J. P., & Agrawal, S. (2024). Automating threat intelligence analysis with retrieval augmented generation (RAG) for enhanced cyber-security posture. International Journal of Science and Research, 13(5), 251–255.
  23. Song, C., Ma, L., Zheng, J., Liao, J., Kuang, H., & Yang, L. (2024). Audit-LLM: Multi-agent collaboration for log-based insider threat detection (arXiv:2408.08902). arXiv.
  24. Yu, M., Meng, F., Zhou, X., Wang, S., Mao, J., Pan, L., Chen, T., Wang, K., Li, X., Zhang, Y., et al. (2025). A survey on trustworthy LLM agents: Threats and countermeasures. In Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining (Vol. 2) (pp. 6216–6226). ACM.
  25. Li, M., Zhang, P., Xing, W., Zheng, Y., Zaporojets, K., Chen, J., Zhang, R., Zhang, Y., Gong, S., Hu, J., et al. (2025). Using large language models to tackle fundamental challenges in graph learning: A comprehensive survey (arXiv:2505.18475). arXiv.
  26. Kumar, V. N., Sivaji, U., Kanishka, G., Devi, B. R., Suresh, A., Madhavi, K. R., & Ahmed, S. T. (2023). A framework for tweet classification and analysis on social media platform using federated learning. Malaysian Journal of Computer Science, 90-98.
  27. Singh, K. D., & Ahmed, S. T. (2020, July). Systematic linear word string recognition and evaluation technique. In 2020 international conference on communication and signal processing (ICCSP) (pp. 0545-0548). IEEE.
  28. Sreedhar Kumar, S., Ahmed, S. T., Mercy Flora, P., Hemanth, L. S., Aishwarya, J., GopalNaik, R., & Fathima, A. (2021, January). An improved approach of unstructured text document classification using predetermined text model and probability technique. In ICASISET 2020: Proceedings of the First International Conference on Advanced Scientific Innovation in Science, Engineering and Technology, ICASISET 2020, 16-17 May 2020, Chennai, India (p. 378). European Alliance for Innovation.