Authors:
Abhilash Reddy Pabbath Reddy
Addresses:
Department of Information Technology, Axle Info, Cumming, Georgia, United States of America.
Due to cyber threat complexity, perimeter-centric security must be replaced with smarter, more dynamic solutions. Zero Trust Architecture (ZTA), which advocates for "never trust, always verify," is the most widely adopted security model. ZTA benefits from real-time anomaly detection, adaptive access, and predictive threat response with AI. It describes how AI-powered ZTA can thwart advanced cybersecurity assaults in hybrid and multi-cloud systems. It covers identity-based authentication, real-time threat detection, dynamic policy enforcement, and contextual analysis. Businesses can now gain deep insights into network behavior and automate security measures using AI technologies, such as machine learning and behavioral inspection. Real-time simulations and security log data are used in the mixed-method research. AI-augmented ZTA prevents breaches, reduces reaction time, and increases threat visibility in modern networks. AI-enabled Zero Trust policies use tables and graphs to improve detection accuracy and system integrity. The architecture supports scalability, modularity, and integration with cybersecurity frameworks. A novel scalable enterprise network cybersecurity design and an AI-driven Zero Trust paradigm are described in the essay. The study concludes with implications, limits, and future research options. The findings necessitate that organisations implement AI-driven ZTA as a permanent defence against cyber threats.
Keywords: Cybersecurity and Artificial Intelligence; Access Control; Threat Detection; Zero Trust Architecture; Hybrid and Multi-Cloud Environments; Internet of Things; Detection Accuracy; System Integrity.
Received on: 21/07/2024, Revised on: 01/10/2024, Accepted on: 12/11/2024, Published on: 07/03/2025
DOI: 10.69888/FTSIN.2025.000366
FMDB Transactions on Sustainable Intelligent Networks, 2025 Vol. 2 No. 1, Pages: 10-21