Towards Autonomous Security: Leveraging Artificial Intelligence for Dynamic Policy Formulation and Continuous Compliance Enforcement in Zero Trust Security Architectures
Keywords:
Zero Trust Security, Artificial Intelligence, Machine LearningAbstract
Cybercriminals evolve, rendering perimeter protection worthless. To solve this, Zero Trust Security (ZTS) designs require least privilege and careful access request verification. ZTS's dynamic context-aware access restriction and continuous evaluation complicate security policy design and enforcement. Scalability to handle changing user demographics, system configurations, and new threats and attack vectors is a challenge. AI can automate policy creation and compliance evaluation to enhance ZTS, says one research.
References
A. Ghare et al., "Zero trust security - Model and implementation," 2010 International Conference on Advanced Information Networking and Applications (AINA), Singapore, 2010, pp. 1018-1023, doi: 10.1109/AINA.2010.187.
Y. Mao et al., "A Survey of Cloud Computing Security: Systems and Applications," Journal of Network and Computer Applications, vol. 94, pp. 1-16, 2017, doi: 10.1016/j.jnca.2017.04.001
N. Papernot et al., "Distillation as a Defense to Adversarial Perturbations in Deep Learning," in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 2016, pp. 1462-1477, doi: 10.1145/2937864.2941458
I. Goodfellow et al., "Explaining and Attributing Decisions of Machine Learning Systems," arXiv preprint arXiv:1606.08853, 2016.
P. McDaniel et al., "Federated Learning for Privacy-Preserving Fraud Detection," in 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 2019, pp. 5239-5246, doi: 10.1109/BigData.2019.8908102.
H. Cheng et al., "Improving Federated Learning Performance: Communication Efficiency and Privacy," in Proceedings of the 2020 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '20, New York, NY, USA, 2020, pp. 4300-4310, doi: 10.1145/3394480.3400173.
V. Vapnik, "The Nature of Statistical Learning Theory," Springer Science & Business Media, 1995.
L. Wasserman, "All of Statistics: A Concise Course in Statistical Inference," Springer Science & Business Media, 2004.
I. Goodfellow et al., "Deep Learning," MIT Press, 2016.
Y. LeCun et al., "Gradient-based learning applied to document recognition," Proceedings of the IEEE, vol. 86(11), pp. 2278-2324, 1998, doi: 10.1109/5.726791.
D. E. Rumelhart et al., "Parallel Distributed Processing: Explorations in the Microstructure of Cognition. Volume 1: Foundations," MIT Press, 1986.
J. Schmidhuber, "Neural Networks for Long-Term Memory," Istituto Nazionale per l'Alta Matematica Francesco Severi, 2005.
S. Hochreiter and J. Schmidhuber, "Long Short-Term Memory," Neural Computation, vol. 9(8), pp. 1735-1780, 1997, doi: 10.1162/neco.1000093.
V. Nair and G. Hinton, "Recurrent Neural Networks for Recognition and Paragraph Generation," arXiv preprint arXiv:1409.0478, 2014.
D. P. Kingma and M. Welling, "Auto-Encoding Variational Bayes," arXiv preprint arXiv:1312.6114, 2013.
J. An et al., "Unsupervised Anomaly Detection with LSTMs for Industrial Big Data," IEEE Transactions on Industrial Informatics, vol. 13.
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.