AI-driven adaptive authentication for zero trust security architectures

Shah, Hitarth and Shah, Mahak (2025) AI-driven adaptive authentication for zero trust security architectures. International Journal of Science and Research Archive, 14 (3). pp. 705-712. ISSN 2582-8185

[thumbnail of IJSRA-2025-0645.pdf] Article PDF
IJSRA-2025-0645.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download ( 600kB)

Abstract

Zero Trust Security Architectures (ZTSA) represent a paradigm shift in cybersecurity by eliminating implicit trust and enforcing continuous verification. In this paper, we introduce an AI-driven adaptive authentication framework that leverages real-time risk assessment through advanced mathematical modeling and machine learning techniques. Our framework integrates multiple data sources—including user behavior, device integrity, and external threat intelligence—to dynamically adjust authentication protocols. We provide a rigorous mathematical formulation, detailed experimental analysis, algorithm pseudocode, and discussions on ethical, regulatory, and deployment challenges. Extensive ablation studies and sensitivity analysis are included to compare our approach with baseline systems and to understand the impact of key parameters. Additionally, we include scientific plots such as an ROC curve and a calibration plot to further evaluate model performance.

Item Type: Article
Official URL: https://doi.org/10.30574/ijsra.2025.14.3.0645
Uncontrolled Keywords: Zero Trust; Adaptive Authentication; Artificial Intelligence; Cybersecurity; Machine Learning; Risk Assessment; ROC Curve; Calibration Plot
Depositing User: Editor IJSRA
Date Deposited: 16 Jul 2025 18:28
Related URLs:
URI: https://eprint.scholarsrepository.com/id/eprint/1103