Back to Top

Paper Title

Integrating Machine Learning with Zero Trust Principles for Real-Time Threat Detection and Response

Keywords

  • zero trust architecture
  • machine learning
  • cybersecurity
  • real-time threat detection
  • adaptive security
  • intrusion detection
  • automated response

Article Type

Research Article

Issue

Volume : 7 | Issue : 9 | Page No : 564-575

Published On

March, 2024

Downloads

Abstract

The rapid advancement of cyber threats has rendered traditional perimeter-based security approaches insufficient, necessitating the development of adaptive and intelligent solutions. Zero Trust Architecture (ZTA), grounded in the principles of "never trust, always verify”, represents a paradigm shift that enforces continuous authentication, authorization, and least-privilege access across digital ecosystems (Stafford, 2020; Syed et al., 2022). Although ZTA enhances the security posture, its static policy enforcement mechanisms often face challenges in addressing real-time, high volume cyberattacks. Machine learning (ML), with its capabilities in anomaly detection, behavioral analysis, and predictive modelling, offers a dynamic layer that can augment ZTA for proactive and real-time threat detection (Gudula et al., 2021; Okoli et al., 2024). This study investigates the integration of ML techniques into Zero Trust principles to design a hybrid framework capable of continuous verification, adaptive response, and real-time anomaly mitigation. Utilizing benchmark cybersecurity datasets and advanced ML algorithms, the proposed framework demonstrates improvements in detection accuracy, scalability, and automated response latency over conventional models. These findings underscore the synergistic potential of combining ML with ZTA, establishing a pathway for next-generation cybersecurity frameworks applicable across cloud, IoT, and enterprise infrastructures (Paul et al., 2024; Tiwari et al., 2022). This study contributes to the advancement of secure digital ecosystems by proposing a holistic model that addresses both the strengths and limitations of current ML-augmented Zero Trust systems.

View more >>

Uploded Document Preview