Integrating Machine Learning with Zero Trust Principles for Real-Time Threat Detection and Response
  • Author(s): Mukul Mangla
  • Paper ID: 1710384
  • Page: 564-575
  • Published Date: 31-03-2024
  • Published In: Iconic Research And Engineering Journals
  • Publisher: IRE Journals
  • e-ISSN: 2456-8880
  • Volume/Issue: Volume 7 Issue 9 March-2024
Abstract

The rapid advancement of cyber threats has rendered traditional perimeter-based security approaches insufficient, necessitating the development of adaptive and intelligent solutions. Zero Trust Architecture (ZTA), grounded in the principles of "never trust, always verify”, represents a paradigm shift that enforces continuous authentication, authorization, and least-privilege access across digital ecosystems (Stafford, 2020; Syed et al., 2022). Although ZTA enhances the security posture, its static policy enforcement mechanisms often face challenges in addressing real-time, high volume cyberattacks. Machine learning (ML), with its capabilities in anomaly detection, behavioral analysis, and predictive modelling, offers a dynamic layer that can augment ZTA for proactive and real-time threat detection (Gudula et al., 2021; Okoli et al., 2024). This study investigates the integration of ML techniques into Zero Trust principles to design a hybrid framework capable of continuous verification, adaptive response, and real-time anomaly mitigation. Utilizing benchmark cybersecurity datasets and advanced ML algorithms, the proposed framework demonstrates improvements in detection accuracy, scalability, and automated response latency over conventional models. These findings underscore the synergistic potential of combining ML with ZTA, establishing a pathway for next-generation cybersecurity frameworks applicable across cloud, IoT, and enterprise infrastructures (Paul et al., 2024; Tiwari et al., 2022). This study contributes to the advancement of secure digital ecosystems by proposing a holistic model that addresses both the strengths and limitations of current ML-augmented Zero Trust systems.

Keywords

Zero Trust Architecture, Machine Learning, Cybersecurity, Real-Time Threat Detection, Adaptive Security, Intrusion Detection, Automated Response

Citations

IRE Journals:
Mukul Mangla "Integrating Machine Learning with Zero Trust Principles for Real-Time Threat Detection and Response" Iconic Research And Engineering Journals Volume 7 Issue 9 2024 Page 564-575

IEEE:
Mukul Mangla "Integrating Machine Learning with Zero Trust Principles for Real-Time Threat Detection and Response" Iconic Research And Engineering Journals, 7(9)