Back to Top

Paper Title

AI-Powered Cyber Defense: Combining Zero Trust, De-Identification, and Autonomous Threat Response

Keywords

  • ai-powered cybersecurity
  • zero trust architecture (zta)
  • autonomous threat response
  • data de-identification
  • behavioral analytics
  • adversarial robustness
  • explainable ai (xai)
  • differential privacy
  • security orchestration
  • automation
  • and response (soar)
  • blockchain auditability

Article Type

Research Article

Journal

Journal:International Journal on Science and Technology

Research Impact Tools

Issue

Volume : 16 | Issue : 2 | Page No : 1-6

Published On

June, 2025

Downloads

Abstract

As cyberattacks become more advanced, businesses need smarter and more flexible ways to protect themselves—traditional firewalls and perimeter-based defenses just aren’t enough anymore. This paper introduces a new cybersecurity system that uses artificial intelligence (AI) to combine several cutting-edge approaches: Zero Trust Architecture (which always verifies user access), data de-identification (which protects personal information), and automated threat response (which reacts to attacks without human delay). The system includes modern features like behavior analysis to detect risky activity, AI models that are resistant to manipulation, and tools that help explain how security decisions are made. It also uses blockchain to keep a transparent record of what actions were taken and why. We tested this approach on a simulated dataset of 1.2 million entries and ran pilot programs in the finance and healthcare sectors. The results showed clear benefits: threat detection accuracy improved by 28%, false alarms were cut nearly in half, response times dropped by 45%, and privacy compliance went up by 18%. The system ran efficiently, adding only 12% CPU usage and keeping its AI response times under 150 milliseconds for most requests. Future improvements will focus on running the system on edge devices, training models securely across multiple locations using federated learning, and preparing it to resist even the most advanced future threats, including those posed by quantum computing. Overall, this research marks real progress in building smarter, more secure, and privacy-aware defense systems.

View more >>

Uploded Document Preview