Shah, Hitarth and Shah, Mahak (2025) AI-driven adaptive authentication for zero trust security architectures. International Journal of Science and Research Archive, 14 (3). pp. 705-712. ISSN 2582-8185
![IJSRA-2025-0645.pdf [thumbnail of IJSRA-2025-0645.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
IJSRA-2025-0645.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
Zero Trust Security Architectures (ZTSA) represent a paradigm shift in cybersecurity by eliminating implicit trust and enforcing continuous verification. In this paper, we introduce an AI-driven adaptive authentication framework that leverages real-time risk assessment through advanced mathematical modeling and machine learning techniques. Our framework integrates multiple data sources—including user behavior, device integrity, and external threat intelligence—to dynamically adjust authentication protocols. We provide a rigorous mathematical formulation, detailed experimental analysis, algorithm pseudocode, and discussions on ethical, regulatory, and deployment challenges. Extensive ablation studies and sensitivity analysis are included to compare our approach with baseline systems and to understand the impact of key parameters. Additionally, we include scientific plots such as an ROC curve and a calibration plot to further evaluate model performance.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/ijsra.2025.14.3.0645 |
Uncontrolled Keywords: | Zero Trust; Adaptive Authentication; Artificial Intelligence; Cybersecurity; Machine Learning; Risk Assessment; ROC Curve; Calibration Plot |
Depositing User: | Editor IJSRA |
Date Deposited: | 16 Jul 2025 18:28 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/1103 |