International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences
E-ISSN: 2349-7300Impact Factor - 9.907

A Widely Indexed Open Access Peer Reviewed Online Scholarly International Journal

Call for Paper Volume 13 Issue 2 March-April 2025 Submit your research for publication

AI-Powered Zero Trust Architecture for Web App Security

Authors: Sandeep Phanireddy

DOI: https://doi.org/10.5281/zenodo.14945119

Short DOI: https://doi.org/g86n7p

Country: USA

Full-text Research PDF File:   View   |   Download


Abstract: Traditional perimeter-based security models fail to protect against advanced cyber threats, so organizations need a better security framework which implements Zero Trust principles. Zero Trust Architecture (ZTA) uses the verification principle of "never trust always verify" to deliver a real-time security solution with authentication along with authorization and monitoring. The deployment of Artificial Intelligence (AI) within Zero Trust security operations delivers automatic threat identification along with behavior analysis services and adaptive policy implementations to boost protection measures. AI-enabled Zero Trust security frameworks show widespread industrial success through successful prevention of unauthorized access combined with fraud prevention and the elimination of phishing attacks. The implementation of Zero Trust security faces multiple challenges because it deals with elevated false positive detection rates together with substantial computational requirements and adversarial attack threats and follows strict regulatory framework requirements. This paper examines AI-driven Zero Trust security for web applications by investigating major system components and practical applications while identifying leading obstacles. The paper outlines future research avenues with an emphasis on defense methods for adversarial AI together with federal learning techniques for confidential analytics and power-efficient AI detection solutions for real-time security threats.

Keywords: Zero Trust Architecture, AI-Powered Security, Web Application Security, Cybersecurity, Anomaly Detection, Risk-Based Authentication, Adversarial AI, Federated Learning, Cloud Security, Regulatory Compliance


Paper Id: 232171

Published On: 2023-07-07

Published In: Volume 11, Issue 4, July-August 2023

Share this