ZERO-TRUST ARCHITECTURE IN HYBRID CLOUD ENVIRONMENTS WITH AI-DRIVEN THREAT DETECTION: A NEXT GEN APPROACH TO CYBERSECURITY

##article.authors##

  • Istamov Mirjahon Mo‘minjon ogli ##default.groups.name.author##
  • Bahronov Shahzodjon Vahobjon ogli ##default.groups.name.author##
  • Isoqov Diyorbek Dilshod ogli ##default.groups.name.author##

##semicolon##

AI, Zero-Trust architecture, cybersecurity, hybrid cloud environments, threat detection, artificial intelligence, security monitoring, user authentication, access control, automated security, real-time analysis, zero trust model.

##article.abstract##

This article analyzes the issues of threat detection based on artificial intelligence (AI) and ensuring cybersecurity through Zero-Trust architecture in hybrid cloud environments. Due to the inadequacy of traditional security approaches in hybrid 
infrastructures, it is essential to operate based on the Zero-Trust model, which verifies every access point. AI technologies enable real-time threat prediction, anomaly detection, and rapid response to threats. Furthermore, the article highlights how the 
components of Zero-Trust architecture, user identity, permission management, and security monitoring integrate with AI. Additionally, through the application of AI and Zero-Trust approaches in hybrid cloud environments, organizations can establish a 
robust defense system against cyberattacks, automate security policies, and maintain constant monitoring of information systems.

##submission.citations##

1. Sommer, R., & Paxson, V. (2010). Outside the Closed World: On Using Machine

Learning for Network Intrusion Detection. IEEE Symposium on Security and Privacy.

2. Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method

integrating anomaly detection with misuse detection. Expert Systems with

Applications, 41(4).

3. Sculley, D., et al. (2015). Machine Learning: The High-Interest Credit Card of

Technical Debt. NIPS. 4. Fortinet (2023). FortiAI: Artificial Intelligence for Cybersecurity – Whitepaper.

5. Darktrace (2024). Enterprise Immune System: AI for Cyber Defense – Technical

Overview.

6. Palo Alto Networks (2024). Cortex XDR and the Role of ML in Threat Detection –

Product Documentation.

7. Moustafa, N., & Slay, J. (2015). UNSW-NB15: A Comprehensive Data Set for

Network Intrusion Detection Systems. Military Communications and Information

Systems Conference.

##submissions.published##

2025-06-10