Ethical and Trustworthy Autonomous Agents in Network SecOps: Transparency, Auditing, and Human-in-the-Loop Overrides

Authors

  • Amar Gurajapu Principal Member of Tech Staff, Network Systems, AT&T, New Jersey, United States Author
  • Swapna Anumolu Principal Member of Tech Staff, Network Systems, AT&T, New Jersey, United States Author
  • Vardhan Garimella Consultant, Intellibus, United States Author
  • Venkata Manikanta Sai Ramakrishna Chundi Lead Architect, Intellibus, United States Author
  • Venkata Sita Anand Prakash Gubbala Vice President, Wissen Inc, United States Author

DOI:

https://doi.org/10.32996/jcsts.2025.4.2.7

Keywords:

Autonomous Agents, Network Orchestration, SLA Compliance, Reinforcement Learning, QoS Monitoring, Software-Defined Networking, Multi-Cloud, SecOps, Cybersecurity

Abstract

This paper introduces EthosSecOps, a comprehensive framework designed to enhance transparency, auditability, and ethical alignment in AI-driven intrusion detection and automated response systems. EthosSecOps integrates an Explainability Layer for generating feature-attribution explanations, a Blockchain-backed Audit Store to immutably record alerts, actions, and overrides, and a Policy-Driven Override Engine that empowers human analysts to pause, modify, or abort agent actions. Implemented within a hybrid-cloud telecom environment, EthosSecOps demonstrated 95% attack mitigation accuracy, delivered real-time explanations within 10 milliseconds, and enabled immediate human intervention without disrupting service. The paper details the system's architecture, provides a Python-based audit-logging example, presents empirical evaluation results, and discusses ethical implications for trustworthy autonomous SecOps in regulated and high-availability network operations.

Downloads

Published

2025-02-19

Issue

Section

Research Article

How to Cite

Ethical and Trustworthy Autonomous Agents in Network SecOps: Transparency, Auditing, and Human-in-the-Loop Overrides . (2025). Frontiers in Computer Science and Artificial Intelligence, 4(2), 63-66. https://doi.org/10.32996/jcsts.2025.4.2.7