AI-Driven Zero Trust Architecture: A Scalable Framework for Threat Detection and Adaptive Access Control

Authors

  • Mukul Mangla Independent Researcher

DOI:

https://doi.org/10.56127/ijst.v2i3.2274

Keywords:

Zero Trust Architecture (ZTA);Artificial Intelligence (AI); Threat Detection; Adaptive Access Control; Cybersecurity Framework; Machine Learning; Scalability; Cloud Security; Identity and Access Management (IAM)

Abstract

The rapid growth of complex cyber threats has rendered perimeter-based security models ineffective in protecting the enterprise environment. Zero Trust Architecture (ZTA) has become a paradigm shift in the industry, eliminating implicit trust and mandating rigorous verification for every access request. However, ZTA implementations traditional to this day have limitations associated with scaling, flexibility, and real-time detection of changing patterns of attacks. This study proposes an AI-based Zero Trust platform that leverages artificial intelligence and machine learning to enhance security by expanding threat detection and supporting dynamic access controls across various infrastructural settings, including the cloud, internet-connected devices, and key enterprise systems. This framework proposes multi-layered intelligence that incorporates behavioral analytics, anomaly detection, and dynamic policy orchestration, in which continuous verification and risk-based access decisions are enabled. Its architecture, involving the utilization of AI-based automation and cloud-native scale, is applicable to minimize false positives, address insider and outside threats, and be dynamic to react to contextual risk indicators. The results of the proposed study support the idea that AI integration with ZTA is essential to becoming cyber resilient against advanced cyber-attacks, therefore, creating a scalable, intelligent, and future beyond one cybersecurity model.

References

Abbas, N., & Anis, M. (2022, December). The future of cybersecurity: Leveraging AI for threat prediction and zero trust defense.

Anderson, J. (2020). AI-driven threat detection in zero trust network segmentation: Enhancing cyber resilience.

Balogun, F., & Badi, S. (2019). Securing the edge: AI-powered zero-trust deployment in resource-limited contexts.

Bayya, A. K. (2022). Cutting-edge practices for securing APIs in FinTech: Implementing adaptive security models and zero trust architecture. International Journal of Applied Engineering and Technology (London), 4, 279–298.

Cate, M. (2023). Integration of AI with zero trust architecture for real-time web application protection.

Chaganti, K. C. (2023). Advancing AI-driven threat detection in IoT ecosystems: Addressing scalability, resource constraints, and real-time adaptability. Authorea Preprints.

Davis, J., Eze, O., & Adrian, G. (2017). Frameworks for future cyber defense: Integrating AI and zero-trust in emerging economies.

Ejeofobiri, C. K., Adelere, M. A., & Shonubi, J. A. (2022). Developing adaptive cybersecurity architectures using zero trust models and AI-powered threat detection algorithms. International Journal of Computer Applications Technology and Research, 11(12), 607–621.

Freed, G., & Jackson, M. (2022, December). Zero trust architecture in AI-driven cybersecurity: A machine learning perspective.

Ghasemshirazi, S., Shirvani, G., & Alipour, M. A. (2023). Zero trust: Applications, challenges, and opportunities. arXiv preprint arXiv:2309.03582.

Gudala, L., Shaik, M., & Venkataramanan, S. (2021). Leveraging machine learning for enhanced threat detection and response in zero trust security frameworks: An exploration of real-time anomaly identification and adaptive mitigation strategies. Journal of Artificial Intelligence Research, 1(2), 19–45.

Haider, M., & Bhutto, B. (2022). Reinforcing cybersecurity with zero trust and AI-powered strategies.

Hishongwa, H. (2021). Implementing zero trust security models in cloud computing for enhanced threat mitigation. International Journal, 6(1), 79–86.

Inaganti, A. C., Sundaramurthy, S. K., Ravichandran, N., & Muppalaneni, R. (2020). Zero trust to intelligent workflows: Redefining enterprise security and operations with AI. Artificial Intelligence and Machine Learning Review, 1(4), 12–24.

Jordan Smith, A. E. (2023). Context-aware AI-augmented access control for dynamic MFA environments in critical infrastructure.

Kaul, D. (2019). Blockchain-powered cyber-resilient microservices: AI-driven intrusion prevention with zero-trust policy enforcement.

Lamia, A., Muhammad Mainuddin, M., Nusrat Jahan, S., & Sagor, A. (2022). Zero-trust access control systems by artificial intelligence in hybrid cloud environments. Best Journal of Innovation in Science, Research and Development, 1(3), 45–69.

Mareedu, A. (2023). Zero trust before the hype: Foundational concepts and early AI-driven implementations. International Journal of Emerging Research in Engineering and Technology, 4(4), 53–64.

Mark, M. A. M., & Joy, M. (2021). Intelligent trust: Leveraging AI for dynamic policy orchestration in zero trust security architectures.

Owobu, W. O., Abieba, O. A., Gbenle, P., Onoja, J. P., Daraojimba, A. I., Adepoju, A. H., & Chibunna, U. B. (2022). Conceptual framework for deploying data loss prevention and cloud access controls in multi-layered security environments. International Journal of Multidisciplinary Research Growth Evaluation, 3(1), 850–860.

Parisa, S. K., Banerjee, S., & Whig, P. (2023). AI-driven zero trust security models for retail cloud infrastructure: A next-generation approach. International Journal of Sustainable Development in Field of IT, 15, 15.

Paul, J. (2023). Identity-centric security for cloud workloads: A zero-trust approach to cyber threats.

Phanireddy, S. (2023). AI-powered zero trust architecture for web app security. Available at SSRN 5257699.

Shoaib Hashim, M. I. (2023). Zero trust meets AI: Redefining security in the age of advanced cyber threats.

Smith, J., & Chikwarti, D. K. (2023). Self-learning AI models for behavior-driven access management in zero trust architectures.

Smith, J., & Karan, D. (2023). AI-driven anomaly detection for insider threat prevention in identity and access management (IAM) systems.

Tauseef, A. (2023). AI in cybersecurity: Leveraging database innovations for intelligent threat response.

Tiwari, S., Sarma, W., & Srivastava, A. (2022). Integrating artificial intelligence with zero trust architecture: Enhancing adaptive security in modern cyber threat landscape. International Journal of Research and Analytical Reviews, 9, 712–728.

Uddoh, J., Ajiga, D., Okare, B. P., & Aduloju, T. D. (2021). AI-based threat detection systems for cloud infrastructure: Architecture, challenges, and opportunities.

Zichen, R. (2022). AI-driven threat detection in zero trust environments. Available at SSRN 5146272.

Downloads

Published

2023-10-30

How to Cite

Mangla, M. (2023). AI-Driven Zero Trust Architecture: A Scalable Framework for Threat Detection and Adaptive Access Control. International Journal Science and Technology, 2(3), 128–135. https://doi.org/10.56127/ijst.v2i3.2274

Similar Articles

1 2 3 4 5 6 7 8 > >> 

You may also start an advanced similarity search for this article.