2022 5th International Conference on Computing and Informatics (ICCI) 2022
DOI: 10.1109/icci54321.2022.9756117
|View full text |Cite
|
Sign up to set email alerts
|

An Artificial Intelligence Approach for Deploying Zero Trust Architecture (ZTA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…However, machine learning can detect abnormal behavior or malicious activities in network traffic, and deep learning can analyze vast amounts of data to discover threat patterns (Sedjelmaci et al 2023). Automated policy configuration can enhance existing security intelligence engines by incorporating more complex rules and and minimizing time and effort (Hosney et al 2022). A MSG model based on machine learning can mitigate lateral Zero trust in cloud computing Cloud computing has gained widespread popularity in recent years as organizations seek to optimize their IT infrastructure and cut costs.…”
Section: Analyzing Key Research Hotspots and Future Trends For Zero T...mentioning
confidence: 99%
“…However, machine learning can detect abnormal behavior or malicious activities in network traffic, and deep learning can analyze vast amounts of data to discover threat patterns (Sedjelmaci et al 2023). Automated policy configuration can enhance existing security intelligence engines by incorporating more complex rules and and minimizing time and effort (Hosney et al 2022). A MSG model based on machine learning can mitigate lateral Zero trust in cloud computing Cloud computing has gained widespread popularity in recent years as organizations seek to optimize their IT infrastructure and cut costs.…”
Section: Analyzing Key Research Hotspots and Future Trends For Zero T...mentioning
confidence: 99%
“…Comprehensive Verification and Encryption: Zero Trust revolves around multifactor authentication (MFA), a process where both users and devices must prove their legitimacy. It also includes strong encryption to protect data and communications, as noted by Hosney et al (2022). Additional security checks, such as device verification, are employed to fortify defenses.…”
Section: Zero Trust Security Frameworkmentioning
confidence: 99%
“…Considering legacy systems and diverse platforms may cause compatibility matters, proper planning and interconnection of systems would be essential to seamlessly incorporate the Zero Trust environment. Remodeling an infrastructure is a large and complex project, therefore, there is a consideration of financial implications for investment, personnel, training, upgrades, and ongoing maintenance and support [39]. Organizations must reallocate resources strategically and perform a cost-benefit analysis to determine the level of Zero Trust adoption.…”
Section: Integration and Limitationsmentioning
confidence: 99%