Call for Papers
Quick Links
Real Time AI-Driven Threat Detection with the Integration of Zero Trust Security Framework
Shreyanshi Srivastava
Department of Computer Science, National P.G. College, Lucknow, India
Author
Anshika Prajapati,
Department of Computer Science, National P.G. College, Lucknow, India
Author
Mr. Mahesh kumar Tiwari ,
Department of Computer Science, National P.G. College, Lucknow, India
Author
Mr. Amit kumar Srivastava
Department of Computer Science, National P.G. College, Lucknow, India
Author
Doi: https://doi.org/10.63920/tjths.44004
Keywords:
๐ DOI: https://doi.org/10.63920/tjths.44004
๐ Keywords: Artificial Intelligence, ZTA framework, Real time threat detection, cybersecurity,ANN,CNN.
๐ Publication Date: 06 October 2025
๐ License:
This work is licensed under a Creative Commons Attribution 4.0 International License
- Share โ Copy and Redistribute the material
- Adapt โ Remix, Transform, and build upon the material
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Abstract:
This paper elucidate how the Artificial Intelligence with Zero Trust Security determine alert dramatically threat detection and response, this offering a robust security solution against cyber threats. The cooperation of continuous verification, context based authentication, and real-time threat analysis not only reduce risks but also enhances overall security posture. This introduce the use of DL and ML techniques such as ANN and CNN in threat detection that how they mitigate with real time threats. Cybersecurity with zero trust framework and artificial intelligence is an innovative technology in real time threat detection process and adaptive response system. The amalgamation of modern Artificial Intelligence features into zero trust system is forecast to create new opportunities for enhancing adaptive security. This includes automating processes like segmentation, detecting subtle deflections or threats and refining techniques to mitigate risks. Most importantly, it strengthens the principles of Zero Trust and addresses issues associated with minimal and rule based security solutions
Download Full PDF Paper
๐ How to Cite
Shreyanshi Srivastava, Anshika Prajapati, Mr. Mahesh kumar Tiwari ,Mr. Amit kumar Srivastava (2025). Real Time AI-Driven Threat Detection with the Integration of Zero Trust Security Framework. TEJAS J. Technol. Humanit. Sci.,, Vol. 04, Issue 04. https://doi.org/10.63920/tjths.44004
๐ Article Metrics
References
[1]. Aboaoja, R. T., et al. (2023). *Zero Trust Architecture: Challenges and Future Directions*. Computers &
Security, 124, 102976.
[2]. Alawida, F., et al. (2023). *The Convergence of Zero Trust Architecture and Secure Access Service Edge (SASE): A Survey*. Journal of Network and Systems Management, 31(2), 32.
[3]. Al-Saqqa, Z. T., et al. (2022). *User Experience in Zero Trust Security: A Review and Research Agenda*. in Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems.
[4]. Al-Shaer, E., Duan, Q., & Jafarian, J. H. (2013). Random host mutation for moving target defense. *Security and Privacy in Communication Networks*, 310-327.
[5]. Brown, S., Gommers, J., & Serrano, O. (2015). From cyber security information sharing to threat management. *Proceedings of the 2nd ACM workshop on information sharing and collaborative security*, 43-49.
[6]. Gadkari, Bhooshan R. (2024). *AI Integration in Zero Trust Security Architecture: A Technical Overview*. [7]. Gias AU, Casale G, Woodside M. ATOM: Modeldriven autoscaling for microservices. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), IEEE, 2019, 1994-2004.
[8]. Kindervag, J. (2010). *Build Security Into Your Network's DNA: The Zero Trust Network Architecture*. Forrester Research Inc.
[9]. Kindervag, J. (2010). *Build Security Into Your Network's DNA: The Zero Trust Network Model*. Forrester Research.
[10]. Kumar, P., & Gurtov, A. (2022). *A Comprehensive Survey of Zero Trust Network Access*. IEEE Communications Surveys & Tutorials, 24(4), 2262-2287.
[11]. Kumari, Babita. (2024). *Innovative Cloud Architectures: Revolutionizing Enterprise Operations Through AI Integration*. International Journal for Multidisciplinary Research, 6(6), 1-9.
[12]. Liu, F., Wen, Y., Zhang, D., Jiang, X., Xing, X., & Meng, D. (2019). Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise. In *Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security* (CCS '19).
[13]. Liu, Guozhi, et al. (2020). Microservices: architecture, container, and challenges. *2020 IEEE 20th international conference on software quality, eliability and security companion (QRS-C)*. IEEE, 2020.
[14]. Lรณpez MR, Spillner J. Towards quantifiable boundaries for elastic horizontal scaling of microservices. In Companion Proceedings of the10th International Conference on Utility and Cloud Computing, 2017, 35-40.
[15]. Osborn, B., McRee, R., & Beyer, B. (2016). *BeyondCorp: Design to Deployment at Google*. Google.
[16]. Parisa, Sunil Kumar, Somnath Banerjee, and Pawan Whig. (2023). *AI-Driven Zero Trust Security Models for Retail Cloud Infrastructure: A Next-Generation Approach*. International Journal of Sustainable Devlopment in field of IT, 15, 15.
[17]. Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). *Zero Trust Architecture*. National Institute of Standards and Technology (NIST). Special Publication 800-207.
[18]. Sillaber, C., Sauerwein, C., Mussmann, A., & Breu, R. (2016). Data quality challenges and future research directions in threat intelligence sharing practice. *Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security*, 65-70.
[19]. Srirama SN, Adhikari M, Paul S. Application deployment using containers with auto-scaling for microservices in cloud environment. Journal of Network and Computer Applications. 2020; 160:102629.
[20]. Vootkuri, Chaitanya. *Neural Networks in Cloud Security: Advancing Threat Detection and Automated
Response*.
[21]. Wang, W., et al. (2021). *A Zero Trust Framework for Realization of Cloud-Native Security*. in Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
[22]. Ward, Rory, and Betsy Beyer. (2014). Beyondcorp: A new approach to enterprise security. *; login:: the magazine of USENIX & SAGE* 39.6 (2014): 6-11.
[23]. Ward, R., & Beyer, B. (2014). *BeyondCorp: A New Approach to Enterprise Security*. Google. Presented at USENIX LISA 2014.
[24]. Yeoh, William, Marina Liu, Malcolm Shore, and Frank Jiang. (2023). Zero trust cybersecurity: Critical
success factors and A maturity assessment framework 27 July 2023.
[25]. Yuan, Z., Lu, Y., & Wang, Z. (2016). DeepTrust: A Deep Learning Approach for Measuring Social Trust in Big Data. In *2016 IEEE International Conference on Big Data (Big Data)*.
[26]. Zhuang, R., DeLoach, S. A., & Ou, X. (2014). Towards a theory of moving target defense. *Proceedings of the First ACM Workshop on Moving Target Defense*, 31-40.
