ZERO-TRUST ARCHITECTURE IN HYBRID CLOUD ENVIRONMENTS WITH AI-DRIVEN THREAT DETECTION: A NEXT GEN APPROACH TO CYBERSECURITY
##semicolon##
AI, Zero-Trust architecture, cybersecurity, hybrid cloud environments, threat detection, artificial intelligence, security monitoring, user authentication, access control, automated security, real-time analysis, zero trust model.##article.abstract##
This article analyzes the issues of threat detection based on artificial intelligence (AI) and ensuring cybersecurity through Zero-Trust architecture in hybrid cloud environments. Due to the inadequacy of traditional security approaches in hybrid
infrastructures, it is essential to operate based on the Zero-Trust model, which verifies every access point. AI technologies enable real-time threat prediction, anomaly detection, and rapid response to threats. Furthermore, the article highlights how the
components of Zero-Trust architecture, user identity, permission management, and security monitoring integrate with AI. Additionally, through the application of AI and Zero-Trust approaches in hybrid cloud environments, organizations can establish a
robust defense system against cyberattacks, automate security policies, and maintain constant monitoring of information systems.
##submission.citations##
1. Sommer, R., & Paxson, V. (2010). Outside the Closed World: On Using Machine
Learning for Network Intrusion Detection. IEEE Symposium on Security and Privacy.
2. Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method
integrating anomaly detection with misuse detection. Expert Systems with
Applications, 41(4).
3. Sculley, D., et al. (2015). Machine Learning: The High-Interest Credit Card of
Technical Debt. NIPS. 4. Fortinet (2023). FortiAI: Artificial Intelligence for Cybersecurity – Whitepaper.
5. Darktrace (2024). Enterprise Immune System: AI for Cyber Defense – Technical
Overview.
6. Palo Alto Networks (2024). Cortex XDR and the Role of ML in Threat Detection –
Product Documentation.
7. Moustafa, N., & Slay, J. (2015). UNSW-NB15: A Comprehensive Data Set for
Network Intrusion Detection Systems. Military Communications and Information
Systems Conference.