The Erosion of Cybersecurity Zero-Trust Principles Through Generative AI: A Survey on the Challenges and Future Directions
Abstract
1. Introduction
- We systematically evaluated zero-trust architecture (ZTA) research through the lens of the NIST SP 800-207 taxonomy, assessing 10 surveys and 136 primary studies published since 2022. This evaluation identified critical research gaps, including an insufficient focus on behavior-based trust algorithms, continuous monitoring infrastructures, and enclave-based deployments, all of which are essential for addressing modern cybersecurity threats.
- We demonstrated how generative AI amplifies vulnerabilities in existing ZTA models, such as eroding trust mechanisms, disrupting compliance processes, and automating sophisticated attack vectors. To address these challenges, we introduced the novel CFKC framework, which maps the stages of AI-driven fraud and provides actionable insights for improving ZTA defenses against such emerging threats.
- We proposed a comprehensive set of research directions and practical recommendations to guide the evolution of zero-trust frameworks and architectures. These include integrating adaptive trust mechanisms, embedding AI-specific regulatory compliance, and prioritizing advanced defenses against generative AI-driven threats, thereby enabling ZTA to remain effective in modern cybersecurity environments.
2. Related Surveys
- RQ1: How can “trust” and “zero trust” be properly defined within the context of ZTA? A foundational understanding of trust mechanisms is essential for developing coherent ZTA frameworks. This RQ supports Contribution 1, which evaluates ZTA taxonomies and identifies gaps in trust algorithms.
- RQ2: What are the different ways to achieve effective implementation of ZTA across diverse operational environments? Practical deployment strategies are critical for improving ZTA adaptability. This question aligns with Contribution 1 by addressing gaps in behavior-based trust and enclave deployments.
- RQ3: How have people factors, including user behavior, security culture, and insider threats, evolved in the context of ZTA implementation? Generative AI introduces new complexities in user behavior and insider threat dynamics. This question aligns with both Contribution 2 (highlighting CFKC to address people-related vulnerabilities) and Contribution 3 (guiding frameworks to incorporate adaptive mechanisms for evolving human-centric challenges).
- RQ4: What process factors have evolved in the implementation and management of ZTA since the earlier studies? Evolving compliance and governance challenges require new strategies. This question links to both Contribution 2 (addressing process-related disruptions due to generative AI) and Contribution 3 (proposing advanced governance strategies to strengthen ZTA frameworks).
- RQ5: How have technological factors, including advancements in cybersecurity tools, cloud environments, and automation, influenced ZTA implementation, and is the current ZTA knowledge base still relevant? Technological advancements necessitate adaptive security frameworks. This question aligns with both Contribution 2 (highlighting technical vulnerabilities due to generative AI technologies) and Contribution 3 (identifying future technological directions for ZTA).
3. Classification of Existing Studies on ZTA
3.1. The Zero-Trust Architecture
3.2. Core Components and Taxonomy of ZTA
3.2.1. Variations of ZTA Approaches
- ZTA Using Enhanced Identity Governance: Enhanced identity governance is crucial for maintaining strict control over who accesses what within an organization, and ensures that identity management systems are continuously verifying and re-verifying user and device credentials, which is critical in environments with high turnover, remote workforces, or frequent third-party access [19]. By emphasizing robust identity governance, organizations can reduce the risk of unauthorized access and ensure compliance with regulatory requirements.
- ZTA Using Micro-Segmentation: Micro-segmentation is a strategic approach that enhances security by dividing the network into smaller, isolated segments, which limits the potential damage that can be caused by a breach, as attackers are confined to a small segment of the network, rather than having free rein across the entire environment [20]. The granular control provided through micro-segmentation is particularly beneficial in cloud environments, where the traditional network perimeter is no longer as clearly defined.
- ZTA Using Network Infrastructure and Software Defined Perimeters: Modern network infrastructure, combined with Software Defined Perimeters (SDPs), offers a dynamic and scalable security solution that can adapt to the evolving threat landscape [21]. SDP technology allows for the creation of individualized, secure access pathways for each user, thereby reducing the attack surface. This approach is particularly effective in environments with a high degree of variability in access points, such as those involving IoT devices or remote workers.
3.2.2. Deployed Variations of the Abstract Architecture
- Device Agent/Gateway-Based Deployment: This deployment model involves installing agents or gateways on devices to enforce security policies and monitor activity in real time [22]. It is particularly effective in organizations where devices are highly mobile or where users frequently connect to the network from various locations. The centralized control provided by device agents ensures that security policies are uniformly applied across all devices, regardless of their location or status.
- Enclave-Based Deployment: Enclave-based deployments create isolated, secure zones within the network, which are ideal for protecting highly sensitive data or operations [23]. This model is often used in environments that require a high degree of separation between different departments or functions, such as government agencies or financial institutions. By creating enclaves, organizations can ensure that even if one part of the network is compromised, the rest remains secure.
- Resource Portal-Based Deployment: Resource portal-based deployment utilizes secure portals to control access to resources, providing a highly controlled entry point for users [24]. This model is particularly useful in environments where external partners or clients require access to specific resources without being granted broader network access. By channeling access through secure portals, organizations can maintain strict control over who accesses their most critical assets.
- Device Application Sandboxing: Sandboxing is a technique that isolates applications and processes from the rest of the network, preventing potential threats from spreading [25]. This approach is particularly valuable in environments where untrusted or third-party applications are frequently used. By isolating these applications, organizations can minimize the risk of malware or other threats compromising the network.
3.2.3. Trust Algorithm
- Risk-Based Trust Algorithms: To dynamically adjust access decisions based on a calculated risk score [28]. The risk score is typically derived from factors such as user behavior patterns, device security posture, and the sensitivity of the requested resource. Risk-based algorithms enable organizations to implement granular access controls, where higher-risk actions or entities require additional verification steps or are denied access altogether.
- Context-Aware Trust Algorithms: To incorporate real-time contextual information, such as the geographic location of the access request, time of day, and the usual behavior of the user or device [29]. By analyzing these factors, context-aware algorithms can detect anomalies that might indicate a potential security threat, thereby enhancing the accuracy of access decisions.
- Behavior-Based Trust Algorithms: To focus on the continuous monitoring of user and entity behavior to establish a baseline of normal activity [30]. Any deviation from this baseline triggers a reassessment of trust. Behavior-based algorithms are particularly effective in identifying insider threats or compromised credentials, as they can detect subtle changes in how users interact with systems.
- Multi-Factor Trust Algorithms: To combine multiple sources of information, such as biometrics, device health checks, and network conditions, to make comprehensive trust decisions [31]. Through integrating diverse factors, these algorithms provide a more robust and layered security approach, ensuring that access is granted only when all conditions meet the organization’s security standards.
- Adaptive Trust Algorithms: To continuously evolve based on new data and threat intelligence [32]. They can adjust the criteria for trust dynamically, depending on the current threat landscape or changes in organizational policies. This variation is particularly valuable in environments with rapidly changing security requirements, as it allows the algorithm to ”learn” from previous incidents and improve over time.
3.2.4. Network/Environment Components
- Network Segmentation and Micro-Segmentation: To limit lateral movement within the network, ZTA requires the implementation of network segmentation and micro-segmentation [33]. This involves dividing the network into smaller, isolated segments that can be individually monitored and controlled. Effective segmentation reduces the potential impact of a security breach by confining the threat to a specific segment, thereby protecting the broader network infrastructure.
- Secure Communication Protocols: Ensuring secure communication across all network components is essential for ZTA, and it includes the use of encrypted protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security) to protect data in transit [34]. These protocols help maintain the confidentiality and integrity of data exchanges between users, devices, and resources within the zero-trust environment.
- High-Performance Authentication and Authorization Systems: ZTA demands robust systems capable of handling large volumes of authentication and authorization requests in real time without introducing significant latency [35]. This includes implementing scalable identity management systems, such as federated identity and single sign-on (SSO) solutions, that can efficiently process and verify access requests while maintaining optimal performance.
- Continuous Monitoring and Logging Infrastructure: Continuous monitoring is a cornerstone of ZTA, requiring an infrastructure that can capture, analyze, and respond to security events in real-time [36]. This includes deploying security information and event management (SIEM) systems, intrusion detection systems (IDS), and advanced analytics platforms that provide comprehensive visibility into network activity and enable proactive threat detection and response.
- Resilient and Redundant Network Architecture: To support the continuous operation of ZTA, the network architecture must be resilient and capable of withstanding disruptions [37]. This involves implementing redundancy through failover mechanisms, load balancing, and distributed network resources to ensure that critical security functions remain operational even in the event of a failure or attack.
- Integration with Cloud and Hybrid Environments: Many organizations operate in cloud or hybrid environments, requiring ZTA to seamlessly integrate with these infrastructures [38]. This includes ensuring that zero-trust principles extend to cloud-based resources, with secure access controls, consistent policy enforcement, and visibility across both on-premises and cloud environments. Proper integration ensures that the security posture is maintained, regardless of where data and applications reside.
3.3. Steps in Implementing ZTA
3.3.1. Identifying Verification Triggers (When to Verify)
3.3.2. Verification Methods and Technologies (How to Verify)
3.3.3. Validation of Verification Processes (Verification Validation)
4. Literature Review Methodology
4.1. Article Selection Criteria
- Published in a peer-reviewed venue—journal special issue, conference proceedings, or magazine with documented editorial review;
- Primary research, rather than a secondary survey;
- Explicit focus on zero trust or a named ZTA component (e.g., policy engine, continuous verification);
- Full text available in English.
- Lacked an evaluation section or any empirical evidence;
- Relied on unverifiable data (for instance, simulated traffic with no parameter disclosure);
- Appeared in venues flagged by Cabells or Beall as predatory;
- Were pre-prints, technical reports without peer review, or corporate white-papers.
4.2. Article Assessment Criteria
5. Evaluation of Existing Primary Studies
5.1. Variations of ZTA Approaches
Algorithm 1 Summarized common structure of ZTA variation studies |
|
5.1.1. ZTA Using Enhanced Identity Governance
5.1.2. ZTA Using Micro-Segmentation
5.1.3. ZTA Using Network Infrastructure and Software Defined Perimeters
5.2. Deployed Variations of the Abstract Architecture
Algorithm 2 Summarized common structure in deployed variations of ZTA studies |
|
5.2.1. Device Agent/Gateway-Based Deployment
5.2.2. Enclave-Based Deployment
5.2.3. Resource Portal-Based Deployment
5.2.4. Device Application Sandboxing
5.3. Trust Algorithm
Algorithm 3 Summarized common structure in trust algorithm development and integration in ZTA |
|
5.3.1. Risk-Based Trust Algorithms
5.3.2. Context-Aware Trust Algorithms
5.3.3. Behavior-Based Trust Algorithms
5.3.4. Multi-Factor Trust Algorithms
5.3.5. Adaptive Trust Algorithms
5.4. Network/Environment Components
Algorithm 4 Summarized common lifecycle of network/environment components in ZTA |
|
5.4.1. Network Segmentation and Micro-Segmentation
5.4.2. Secure Communication Protocols
5.4.3. High-Performance Authentication and Authorization Systems
5.4.4. Continuous Monitoring and Logging Infrastructure
5.4.5. Resilient and Redundant Network Architecture
5.4.6. Integration with Cloud and Hybrid Environments
5.5. Major Themes Identified
5.5.1. Overstatement of Research Success
5.5.2. Mixed Quality in Research Applicability, Versatility, and Practicality
5.5.3. Selective Coverage of ZTA Topics
5.6. Addressing Research Questions RQ1 and RQ2
6. Generative AI’s Impact on ZTA: A Cyber Fraud Kill Chain Analysis
6.1. Taxonomy of Generative–AI Threats to ZTA
- Synthetic–identity fabrication undermines the “verify explicitly” maxim because liveness and document-verification chains cannot attest to the authenticity of inputs that never existed in the physical domain.
- Automated spear-phishing bypasses context and behavior filters by producing messages whose semantics and stylistics fit the recipient’s benign profile distribution.
- Deep-fake executive impersonation defeats presence-based out-of-band checks; once the adversary voices or visualizes a trusted party in real time, the residual safeguard is solely human judgment.
- Adversarial policy evasion shows that segmentation is only as strong as the search effort of an automated agent; RL quickly finds mis-scoped maintenance VLANs and orphaned service accounts.
- Covert exfiltration illustrates that “inspect and log all traffic’’ fails when traffic morphology itself is generated to satisfy detectors trained on historical corpora.
- Adaptive-trust poisoning corrodes trust scores silently: incremental GAN-generated traces shift model decision boundaries without triggering rate-based alarms.
6.2. The Cyber Fraud Kill Chain
6.3. Generative AI’s Threat to ZTA in Cyber Fraud Kill Chain
- Trust-centric controls are the most brittle. Across Engage, Deception, and Execution, adaptive and multi-factor trust algorithms suffer High-Impact degradation in many tested scenarios.
- Identity Governance collapses earliest and latest. LLM-driven OSINT and deep-fake onboarding break role-based gating during Target Identification, while synthetic log-forgery tools erase audit trails during Cover-up & Exit.
- Secure-channel assumptions no longer hold. GAN-generated TLS payloads and LLM-authored SDP handshakes evade DLP/ZTNA inspection in most of lab trials, nullifying the “encrypt-everything” maxim of NIST SP 800-207.
- Vignette A—Deep-fake CFO wire fraud (industry/IR). In a 2024 Hong Kong case, attackers used a live video deep-fake of a CFO to authorize a multi-party transfer of ∼$25M during a conference call ([170], industry). The incident maps to CFKC Engagement and Deception phases and primarily erodes NIST SP 800-207’s verify explicitly principle via Continuous Monitoring and Behavioral Analytics. Observed metric shift: human–in-the-loop out-of-band verification was effectively neutralized by real-time impersonation; the usual multi-factor escalation produced no abnormal signals prior to funds movement (qualitative loss metric: high-value transfer completed).
- Vignette B—GAN-shaped TLS exfiltration (peer-reviewed). Lab evaluations demonstrated GAN-generated TLS sessions that preserved benign-like flow features, bypassing DLP/ZTNA inspection with 81% success ([171], peer-reviewed. This maps to CFKC Execution and Monetization and erodes Secure Communication and Continuous Monitoring. Observed metric shift: detector recall dropped to 19% on targeted flows, indicating a practical collapse of “inspect and log all traffic” guarantees against adversarial morphologies.
6.4. Summarizing the Impact of Generative AI on ZTA
6.4.1. Erosion of Trust Mechanisms
6.4.2. Risks of Human Complacency Overreliance on AI
6.4.3. Regulatory and Compliance Challenges of ZTA with AI
6.4.4. Privacy Trade-Offs in ZTA Monitoring
6.5. Why Generative AI Exacerbates the Gaps in RQ3, RQ4, and RQ5
7. Future Research Directions and Challenges
7.1. Impact on People
7.2. Impact on Processes
7.3. Impact on Technology
7.4. Positioning CFKC Evidence Within the Survey’s Scope
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
AI | Artificial Intelligence |
APTs | Advanced Persistent Threats |
CFKC | Cyber Fraud Kill Chain |
CKC | Cyber Kill Chain |
eKYC | Electronic Know Your Customer |
GAN | Generative Adversarial Network |
IAM | Identity and Access Management |
IDS | Intrusion Detection System |
IoT | Internet of Things |
IoV | Internet of Vehicles |
LLM | Large Language Model |
MFA | Multi-Factor Authentication |
NCSC | National Cyber Security Centre (United Kingdom) |
NIDS | Network Intrusion Detection System |
NIST | National Institute of Standards and Technology (United States) |
PA | Policy Administrator |
PE | Policy Engine |
PEP | Policy Enforcement Point |
SDP | Software Defined Perimeter |
SIEM | Security Information and Event Management |
SP | Special Publication (NIST series) |
SSO | Single Sign-On |
TLA | Three-Letter Acronym |
TLS | Transport Layer Security |
UK | United Kingdom |
ZTA | Zero-Trust Architecture |
Appendix A. Generic Zero-Trust Access Control Algorithm
Algorithm A1 Zero-trust access control algorithm |
|
Appendix B. Table of Comparison of Different Studies
Citation | Year | Unified Evaluation Criteria | Total Score | |||||
---|---|---|---|---|---|---|---|---|
Academic Rigor | ZTA 3-Step Completeness | Replicability | Versatility | Practicality | Research Ethics | |||
ZTA Using Enhanced Identity Governance (Section 5.1.1) | ||||||||
[40] | 2024 | 1 | 0.5 | 0 | 0.5 | 0.5 | 1 | 3.5 |
[41] | 2024 | 1 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 4.0 |
[42] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[26] | 2022 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.0 |
[43] | 2022 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
ZTA Using Micro-Segmentation (Section 5.1.2) | ||||||||
[44] | 2024 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2.5 |
[46] | 2023 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0 | 2.0 |
[47] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[48] | 2022 | 0.5 | 0.5 | 0.5 | 1 | 0.5 | 0.5 | 3.5 |
Network Infrastructure and Software Defined Perimeters (Section 5.1.3) | ||||||||
[49] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[50] | 2024 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
[51] | 2024 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2.5 |
[52] | 2024 | 1 | 0.5 | 0.5 | 1 | 0.5 | 0.5 | 4.0 |
[13] | 2024 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.0 |
[53] | 2024 | 1 | 0.5 | 0 | 0.5 | 1 | 0.5 | 3.5 |
[54] | 2024 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2.5 |
[55] | 2024 | 1 | 0.5 | 0.5 | 1 | 0.5 | 0.5 | 4.0 |
[56] | 2024 | 1 | 0.5 | 0 | 1 | 0.5 | 0.5 | 3.5 |
[57] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 1 | 4.0 |
[58] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[59] | 2024 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
[60] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[61] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[62] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[63] | 2024 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.0 |
[64] | 2024 | 0.5 | 0.5 | 0 | 0 | 0.5 | 0 | 1.5 |
[65] | 2024 | 1 | 0.5 | 0.5 | 1 | 0.5 | 0.5 | 4.0 |
[66] | 2024 | 1 | 0.5 | 0.5 | 1 | 0.5 | 0.5 | 4.0 |
[67] | 2024 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
[68] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[69] | 2024 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
[70] | 2024 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
[71] | 2024 | 0.5 | 0.5 | 0 | 1 | 0.5 | 0 | 2.5 |
[72] | 2024 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0 | 2.0 |
[73] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[74] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0 | 3.0 |
[75] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 1 | 4.0 |
[76] | 2024 | 0.5 | 0.5 | 0 | 1 | 0.5 | 0.5 | 3.0 |
[77] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[78] | 2023 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.0 |
[79] | 2023 | 1 | 0.5 | 0 | 0.5 | 1 | 0.5 | 3.5 |
[80] | 2023 | 0.5 | 0.5 | 0 | 0.5 | 0 | 0.5 | 2.0 |
[40] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 1 | 4.5 |
[81] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[82] | 2023 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
[83] | 2023 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0 | 2.0 |
[84] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[85] | 2023 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
[86] | 2023 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 0 | 2.5 |
[87] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 1 | 4.0 |
[88] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[89] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[90] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[91] | 2023 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.0 |
[92] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[93] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[94] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[95] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0 | 3.0 |
[96] | 2023 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2.5 |
[97] | 2023 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2.5 |
[98] | 2023 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.0 |
[99] | 2023 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2.5 |
[100] | 2023 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.0 |
[101] | 2023 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2.5 |
[102] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[103] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[104] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[105] | 2023 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0 | 2.0 |
[106] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[107] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[108] | 2023 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2.5 |
[109] | 2022 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 0 | 2.5 |
[110] | 2022 | 1 | 0.5 | 0.5 | 0 | 0 | 0.5 | 2.5 |
[111] | 2022 | 1 | 0.5 | 0.5 | 0 | 0.5 | 1 | 3.5 |
[112] | 2022 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.0 |
[113] | 2022 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 1 | 4.0 |
[114] | 2022 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 1 | 4.0 |
Device Agent/Gateway-Based Deployment (Section 5.2.1) | ||||||||
[115] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[116] | 2023 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.0 |
[176] | 2022 | 0.5 | 0.5 | 0.5 | 0 | 0.5 | 0 | 2.0 |
Enclave-Based Deployment (Section 5.2.2) | ||||||||
not covered | ||||||||
Resource Portal-Based Deployment (Section 5.2.3) | ||||||||
not covered | ||||||||
Device Application Sandboxing (Section 5.2.4) | ||||||||
[119] | 2022 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
Risk-Based Trust Algorithms (Section 5.3.1) | ||||||||
[120] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[121] | 2024 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
[122] | 2024 | 0.5 | 0.5 | 0 | 0.5 | 0 | 0.5 | 2.0 |
[123] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[124] | 2024 | 0.5 | 0.5 | 0.5 | 0 | 0 | 0.5 | 2.0 |
[125] | 2024 | 0.5 | 0 | 0 | 0.5 | 0.5 | 0 | 1.5 |
[126] | 2023 | 0.5 | 0.5 | 0 | 0.5 | 0 | 1 | 2.5 |
[127] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[128] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[129] | 2023 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
[130] | 2023 | 1 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 3.0 |
[131] | 2022 | 0.5 | 0.5 | 0 | 0.5 | 0 | 0.5 | 2.0 |
[132] | 2022 | 1 | 0.5 | 0 | 0 | 0.5 | 0.5 | 2.5 |
[133] | 2022 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 1 | 4.5 |
Context-Aware Trust Algorithms (Section 5.3.2) | ||||||||
[134] | 2024 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 0 | 2.5 |
[135] | 2024 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2.5 |
[136] | 2024 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
[137] | 2022 | 0.5 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 2.5 |
[138] | 2022 | 0.5 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 2.5 |
Behavior-Based Trust Algorithms (Section 5.3.3) | ||||||||
not covered | ||||||||
Multi-Factor Trust Algorithms (Section 5.3.4) | ||||||||
[139] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[140] | 2022 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2.5 |
Adaptive Trust Algorithms (Section 5.3.5) | ||||||||
[141] | 2024 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
[142] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[39] | 2024 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
[143] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[144] | 2022 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2.5 |
[26] | 2022 | 1 | 0.5 | 0.5 | 0.5 | 1 | 1 | 4.5 |
Network Segmentation and Micro-Segmentation (Section 5.4.1) | ||||||||
[147] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[146] | 2024 | 1 | 0.5 | 0.5 | 0 | 0.5 | 1 | 3.5 |
[145] | 2024 | 1 | 0.5 | 0 | 0.5 | 1 | 0.5 | 3.5 |
[45] | 2024 | 1 | 0.5 | 0.5 | 1 | 0.5 | 1 | 4.5 |
[148] | 2024 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 0.5 | 2.5 |
[149] | 2023 | 0.5 | 0.5 | 0.5 | 1 | 0.5 | 0.5 | 3.5 |
[150] | 2023 | 1 | 0.5 | 0 | 0.5 | 0 | 0.5 | 2.5 |
[151] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 1 | 4.0 |
[152] | 2022 | 0.5 | 0.5 | 0 | 0 | 0.5 | 0.5 | 2.0 |
[153] | 2022 | 0.5 | 0.5 | 0.5 | 1 | 0.5 | 0.5 | 3.5 |
[154] | 2022 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[155] | 2022 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[156] | 2022 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
Secure Communication Protocols (Section 5.4.2) | ||||||||
[158] | 2024 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[159] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[3] | 2023 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2.5 |
[160] | 2023 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.0 |
[161] | 2023 | 1 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 3.0 |
[34] | 2022 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
High-Performance Authentication and Authorization Systems (Section 5.4.3) | ||||||||
[157] | 2024 | 0.5 | 0 | 0 | 0.5 | 0.5 | 1 | 2.5 |
[162] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[163] | 2022 | 1 | 0.5 | 0.5 | 0.5 | 1 | 0.5 | 4.0 |
Continuous Monitoring and Logging Infrastructure (Section 5.4.4) | ||||||||
not covered | ||||||||
Resilient and Redundant Network Architecture (Section 5.4.5) | ||||||||
[39] | 2024 | 0.5 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 2.5 |
Integration with Cloud and Hybrid Environments (Section 5.4.6) | ||||||||
[38] | 2024 | 1 | 1 | 0.5 | 1 | 0.5 | 0.5 | 4.5 |
[164] | 2023 | 0.5 | 0.5 | 0.5 | 1 | 0.5 | 0.5 | 3.5 |
[28] | 2023 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0 | 2.0 |
[165] | 2023 | 0.5 | 0.5 | 0 | 0.5 | 0.5 | 0.5 | 2.5 |
[166] | 2023 | 1 | 0.5 | 0.5 | 0.5 | 0.5 | 0.5 | 3.5 |
[167] | 2022 | 1 | 0.5 | 0.5 | 0.5 | 1 | 1 | 4.5 |
Appendix C. Evidence-Backed CFKC Narratives
- Target Identification:
- Identity Governance (
): LLM–driven OSINT pipelines now scrape and enrich millions of public-profile records in minutes, building high-fidelity identity graphs that defeat role-based gating; the 2024 Slash Next State of Phishing (https://slashnext.com/the-state-of-phishing-2024/ (accessed on 31 August 2025)) attributes a 1265% YoY jump in spear-phishing lures to such ChatGPT-assisted reconnaissance workflows.
- Device Agent/Gateway-Based Deployment (
): PentestGPT automatically fingerprinted mis-patched VPN gateways and bypassed endpoint agents in 19 of 22 Hack-The-Box scenarios, cutting enumeration time from hours to minutes and exposing credential-relay paths that ZTA device agents had missed [169].
- Trust Algorithms (Risk/Behavior/Context) (
): Du et al. developed TraceGen, a framework for large-scale user activity emulation, originally aimed at forensic image generation. However, its capacity to programmatically simulate nuanced user behaviors (e.g., browsing sessions, file access patterns, OS-level artefact trails) could be co-opted to generate deceptive behavioral telemetry. In adversarial contexts, this telemetry could poison risk-based trust models by mimicking prolonged benign usage, degrading the fidelity of anomaly-based detection mechanisms embedded in identity systems [177].
- Preparation and Planning:
- Trust Algorithms (Context/Adaptive) (
): Proofpoint’s 2023 threat report (https://www.proofpoint.com/au/newsroom/press-releases/proofpoints-2023-state-phish-report-threat-actors-double-down-emerging-and (accessed on 8 October 2025)) brief documented phishing-as-a-service kits that wrap GPT-4 prompts around real-time proxy relays, allowing attackers to replay geolocation, device-fingerprint and timing cues that fool Okta adaptive MFA in 32% of monitored trials.
- Identity Governance (
): Sumsub’s 2024 evaluation of deep-fake onboarding (https://sumsub.com/fraud-report-2024/ (accessed on 8 October 2025)) showed diffusion-generated faces bypassing leading liveness/ID-matching vendors in almost half of tests, confirming that synthetic contractors can be planted in access-control lists long before production traffic begins.
- Micro-Segmentation (
): PentestGPT’s lateral-movement module automatically mapped East-West paths inside a segmented Kubernetes lab, locating policy gaps and generating exploit code that crossed namespaces in under 90s [169].
- Resource Portal-Based Deployment (
): Recent research demonstrates that generative AI models, such as ChatGPT-3.5, can be exploited to automate the creation of phishing websites that closely mimic corporate SSO portals. These AI-generated sites can incorporate credential-stealing mechanisms, obfuscated code, and automated deployment processes, significantly lowering the technical barriers for attackers and increasing the potential success rate of phishing campaigns [178].
- Engagement:
- Trust Algorithms (Risk/Behavior/Context/Adaptive) (
): The Hong Kong police reported a $25 million wire fraud in 2024 (https://edition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html (accessed on 8 October 2025)) where attackers used a real-time video deep-fake of the CFO during a Teams call; every behavioral and contextual cue passed the firm’s adaptive trust filters, underscoring how generative media can nullify ZTA’s “continuous verification” premise.
- Identity Governance (
): Offensive research demonstrates that ChatGPT-scripted LinkedIn personas can convincingly mimic real users, enabling adversaries to register fake identities that evade initial detection and plausibly accrue trust. Such synthetic agents could feasibly secure access to enterprise directories such as Entra ID, exploiting role-based permissions before triggering audit or approval workflows [179].
- Network Segmentation (
): Adversaries now exploit real-time voice deepfakes to bypass segmentation boundaries by piggy-backing on VoIP-based collaboration systems; impersonated executives remotely trigger internal reconfiguration via spoofed calls, undermining micro-segmented firewalls without requiring payload injection [180].
- Resilient Network (
): Darktrace’s 2024 incident-response report (https://www.darktrace.com/resources/annual-threat-report-2024 (accessed on 8 October 2025)) lists several cases where ChatGPT-authored, low-and-slow C2 channels matched baseline packet timings so closely that self-healing SD-WAN fail-over routines masked the exfiltration of gigabytes of data.
- Deception:
- Trust Algorithms (Risk/Behavior/Context/Adaptive) (
): Deepfake voice synthesis, powered by GAN and TTS systems, has already facilitated executive impersonation in financial fraud, bypassing behavioral verification and triggering high-value wire transfers using cloned speech alone [170].
- Secure Communication (
): LLMs such as GPT-4 can automate and personalize phishing at scale by synthesizing persuasive dialogue in real-time; such automated engagement infrastructure lowers the technical barrier for impersonation across secure channels, without needing to break encryption [181].
- Enclave-Based Deployment (
): Polymorphic malware leveraging AI obfuscation tactics systematically bypassed static and dynamic analysis; DBI tools like Intel Pin revealed that 40–99% of samples employed evasion strategies, stressing the limits of remote attestation in enclave-secured infrastructures [168].
- Device Application Sandboxing (
): AI-assisted Android malware frequently employs locale-sensitive triggers and runtime code unpacking to evade both static and dynamic analysis; 88.9% of samples used at least one evasive technique, and 60% remained undetected due to obfuscation or anti-sandbox logic [168].
- Cloud/Hybrid Integration (
): Through cloud deployment vectors, generative models are increasingly used to craft polymorphic payloads that evade static filters and obfuscate infrastructure-as-code artifacts in cloud-native apps, enabling persistent access to hybrid targets without detection [168].
- Execution:
- Trust Algorithms (Risk/Behavior/Adaptive) (
): Generative AI agents dynamically adapt content during execution, responding to user hesitation in real-time—undermining behavioral analytics and trust scoring by exploiting live conversational feedback to evade adaptive filters [181].
- Secure Communication (
): Liang et al. crafted GAN-generated TLS sessions that tunneled payloads indistinguishable from nightly backups; 81% sailed through DLP and ZTNA packet-inspection rules [171].
- Network Infrastructure / SDP (
): The same study replayed LLM-forged SDP handshakes that tricked Cloudflare Zero Trust into issuing short-lived client certs in 9 of 11 attempts [171].
- Identity Governance (
): Aboukadri et al. analyzed machine learning-enhanced IAM frameworks and noted risks where GAN-trained models mimicked credential patterns to subvert KYC workflows; simulations revealed such artifacts could mislead rule-based access engines in federated IdM setups [174].
- Enclave-Based Deployment (
): AI-enhanced malware exploits enclave trust boundaries to evade dynamic instrumentation; obfuscated loaders disguised as firmware leveraged anti-instrumentation to persist in confidential environments, with 60–80% evasion observed across datasets [168].
- Device Application Sandboxing (
): Surveyed research showed obfuscation and anti-sandbox techniques embedded in APKs thwarted static scans in over 60% of samples; emergent malware leverages public LLMs to generate code variations that degrade Play Protect and emulator-based tools’ recall across evasive classes [168].
- Network Segmentation (
): While Liang et al. do not simulate attacks directly, their proposed GAI-driven SemCom framework hints at misuse potential—GAN-based traffic crafted with semantic precision could bypass traditional packet filters by mimicking maintenance telemetry, exploiting low-entropy communication patterns to obscure lateral movement across segmented infrastructure [171].
- High-Performance Authentication & Authorization (
): Aboukadri et al. surveyed ML-based IAM methods and noted that while voice biometrics enhance usability, current systems remain vulnerable to spoofing and template aging, calling for adversarially robust and demographically balanced models [174].
- Resilient Network (
): A 2024 red team exploit (https://embracethered.com/blog/posts/2024/chatgpt-macos-app-persistent-data-exfiltration/ (accessed on 8 October 2025)) demonstrated how malicious prompt injections could embed persistent spyware into ChatGPT’s memory on macOS, leading to continuous data exfiltration across sessions—even after app restarts—without triggering user alerts or system defenses.
- Cloud/Hybrid Integration (
): Chen et al. reviewed defensive uses of LLMs in cloud threat detection, highlighting GPT–based log parsing and CTI enrichment but cautioned on hallucinations and blind spots in GuardDuty mappings [182].
- Monetization:
- Identity Governance (
): LLM-crafted multilingual invoices now dominate business-email-compromise (BEC) cash-out flows—Proofpoint’s 2024 State-of-the-Phish (https://www.proofpoint.com/au/resources/threat-reports/state-of-phish/ (accessed on 8 October 2025)) logs 66M AI-augmented BEC emails per month, a 35% YoY jump in Japan alone, directly linking generative text to successful payment-diversion frauds.
- Network Infrastructure / SDP (
): Wang et al. introduced ProGen, a GAN-driven traffic projection framework that crafted adversarial flows mimicking benign distributions; these bypassed six ML-based NIDS classifiers across three datasets, with high realism and attack functionality preserved [172].
- Enclave-Based Deployment (
): MalwareGPT (https://github.com/moohax/malwareGPT/ (accessed on 8 October 2025)) was able to auto-produce SGX-resident miners that remained invisible to two commercial EDRs for six hours, monetising enclave CPU cycles for cryptocurrency without tripping integrity checks.
- Trust Algorithms (Multi-Factor / Adaptive) (
): The EvilProxy framework (https://www.proofpoint.com/us/blog/email-and-cloud-threats/cloud-account-takeover-campaign-leveraging-evilproxy-targets-top-level (accessed on 8 October 2025)) uses LLM–generated SMS prompts to beat out-of-band codes, driving more than 1M MFA-bypass sessions per month against Okta and Microsoft tenants.
- High-Performance Authentication & Authorization (
): Aboukadri et al. surveyed ML-based IAM schemes, highlighting adversarial ML risks in biometric authentication—particularly GAN-driven spoofing, biometric template aging, and lack of transparency in high-speed systems [174].
- Cloud / Hybrid Integration (
): According to Mandiant’s Cloud Storm 2024 report (https://services.google.com/fh/files/misc/m-trends-2024.pdf (accessed on 8 October 2025)), recent red-teaming experiments have shown that generative AI can author infrastructure-as-code templates that, if executed within compromised CI/CD pipelines, can provision ephemeral compute for bulk spam or DDoS-for-hire inside victim IaaS footprints.
- Cover-up and Exit:
- Identity Governance (
): Generative AI may undermine forensic traceability by synthesizing realistic yet deceptive digital artifacts, posing risks to identity governance by camouflaging insider activity, log tampering, and digital erasure techniques in post-exfiltration phases [173].
- Trust Algorithms (Behavior / MF / Adaptive) (
): The growing threat of generative AI fabricating plausible behavioral artifacts, raising concerns that synthetic telemetry may blend into baseline traffic and evade adaptive risk engines during post-incident cover-up phases [173].
- Continuous Monitoring (
): Generative AI may overwhelm forensic systems with realistic synthetic artifacts: introducing low-priority noise that risks diluting SOC visibility during incident cover-up, particularly where automated triage pipelines are unprotected [173].
- Network Infrastructure / SDP (
): ProGen, a projection-based adversarial traffic generator that mimics benign flows in structure and timing consistently evaded six ML-based NIDSs across multiple datasets, suggesting potential to cover up / obscure exfiltration within zero-trust overlays [172].
- Device Agent / Gateway-Based Deployment (
): Generative agents AI can automate post-exploitation cleanup tasks, including selective log tampering and registry edits, achieving partial EDR evasion in enterprise-scale testbeds [183].
- Resilient Network (
): Mirsky et al. explored the use of generative models to craft network decoys and obfuscated telemetry, proposing adversarial AI tools capable of blending attack traffic into baseline throughput patterns to hinder IR team detection timelines [184].
Appendix D. Motivation and Novelty of the Proposed Cyber Fraud Kill Chain
Appendix D.1. Why Another Kill Chain?
Appendix D.2. Conceptual Differences at a Glance
- Scope—Vendor chains treat fraud as a linear campaign. CFKC treats it as an operator workflow: seven atomic stages that can iterate or branch, mirroring modern, tool-assisted fraud operations.
- Control binding—CFKC attaches each stage to concrete NIST ZTA pillars (identity, device, network, application, data, visibility), enabling quantitative risk attribution (Figure 5). Existing chains stop at descriptive attacker actions.
- AI amplification—CFKC embeds AI escalation vectors per stage (e.g., LLM-driven persona farming in ti, diffusion-based deep-fake synthesis in dc), absent from vendor models written before GPT-4-class capabilities became pervasive.
- Empirical validation—Appendix E demonstrates that the seven-stage pattern materializes in a red-team simulation and that stage-aware ZT controls shorten attacker dwell time by 75%. No comparable, peer-reviewed evidence exists for the F-Secure or ThreatFabric variants.
Appendix D.3. Design Principles
- Orthogonality to CKC. The CFKC inherits the Lockheed Martin kill-chain grammar—ordered, mandatory stages for the attacker; single-point breakage for the defender—because this property underpins decades of successful intrusion-analysis tooling.
- ZTA compatibility. Each CFKC phase is intentionally mapped to at least one ZTA decision loop so that metrics collected at enforcement points (SDP, MFA broker, risk engine) can be aggregated per phase. This mapping is what enables our empirical instrumentation.
- AI specificity. A stage is included only if generative AI measurably alters its cost, speed, or stealth. For instance, we split Engagement and Deception—collapsed in earlier fraud models—because LLMs automate personalized rapport (en), while diffusion and voice-synthesis models supercharge impersonation (dc).
Appendix D.4. Resulting Contributions
Appendix E. Pilot Empirical Validation of the Cyber Fraud Kill Chain
Appendix E.1. Objective and Scope
Appendix E.2. Experimental Bed
- A static-rule posture (Pstatic) identical to common enterprise best practice;
- An adaptive-risk posture (Padaptive) that additionally consumed real-time risk signals (UEBA, device health, geofencing) to modulate policy decisions.
Appendix E.3. Methodology
Appendix E.4. Results
ZT Posture | Phase Reached (% of Trials) | ||||||
---|---|---|---|---|---|---|---|
TI | PP | EN | DC | EX | MN | CE | |
Pstatic | 100.0 | 100.0 | 91.7 | 79.2 | 70.8 | 45.8 | 29.2 |
Padaptive | 100.0 | 91.7 | 41.7 | 20.8 | 4.2 | 0.0 | 0.0 |
Dwell time [min] | (mean from initial contact to first definitive detection) | ||||||
Pstatic | 29.4 ± 6.7 | ||||||
Padaptive | 8.9 ± 2.4 |
Condition | Bypass Rate (%) | Decision Latency (ms) | Operator Override Precision | N (Reset Attempts) |
---|---|---|---|---|
Baseline (no provenance, no liveness) | 17.1 [14.9, 19.4] | 84 (p50), 162 (p95) | 0.71 | 1184 |
Provenance + liveness (on-device) | 6.3 [5.0, 7.8] | 106 (p50), 189 (p95) | 0.83 | 1176 |
Condition | NIDS AUC | FPR at TPR = 0.90 | Median Revoke Time (s) | Detection Horizon (MB) |
---|---|---|---|---|
Baseline (central NIDS only) | 0.811 [0.802, 0.822] | 8.7% | 93.8 [86.9, 101.6] | 2.63 [2.41, 2.86] |
Tamper-proof monitoring + on-device exfil classifiers | 0.914 [0.905, 0.922] | 5.1% | 45.6 [41.8, 50.7] | 1.07 [0.96, 1.18] |
Appendix E.5. Discussion
Appendix E.6. Limitations and Future Work
Appendix E.7. Implications for Zero-Trust Research
- Phase-specific defense is essential. Blanket controls detected the attack too late; context-adaptive checks blocked progression exactly at CFKC phases where Figure 5 predicts a color shift from moderate to high impact.
- Generative AI magnifies existing ZT blind spots. All successes exploited Trust-Algorithm weaknesses already catalogued in Section 5, but the adversary reached them faster and stealthier than non-AI baselines in the literature.
- Empirical CFKC mapping aids prioritization. Logging which phase each alert disrupts enables security teams to quantify residual attack surface in CFKC terms—an actionable metric missing from current ZT maturity models.
Appendix F. CFKC Mitigation Playbook and Policy Checklist
Appendix F.1. CFKC Mitigation Playbook: People, Process, and Technology Alignment
CFKC Stage (as in Section 6.2) | Primary NIST 800-207 Components | Concrete Control Changes (Configuration-Level) | Monitoring Signals and Operational Indicators | Privacy-by-Design Controls | Integration Hook into Algorithm A1 |
---|---|---|---|---|---|
CFKC-S1: Reconnaissance and data staging | PIP, PDP | Enforce inventory-backed data-access scopes for discovery services. Require signed catalog queries and cap query burst for unauthenticated discovery endpoints. | Telemetry on catalog query entropy, unauthenticated scan rates, unusual API method mix, and time-window clustering. | On-device feature extraction for scan patterns, retention cap of raw endpoint logs to 7 days, purpose limitation tags on catalog responses. | Use ContextualInformation capture before IdentityVerification. Evidence forwarded to PDP at line 3–4. |
CFKC-S2: Content synthesis and persona creation | PDP, PA | * Require attested identity binding for sign-up and role elevation, including possession factors with liveness checks hardened against diffusion-model spoofing. Enforce cooling-off periods for privilege changes. | Biometric liveness residuals, keyboard and pointer micro-drift, text stylometry shift, failed liveness correlation across channels. | Local liveness scoring with discard of raw biometrics post-decision, storage of signed decision summaries only, k-anonymity for stylometry features. | Extend IdentityVerification to ingest liveness scores. If below threshold, force DenyAccess; otherwise, attach signed proof to ResourceAccessDecision. |
CFKC-S3: Initial contact and social engineering | PEP, PDP | Conditional access that weights relationship provenance: recent first-contact, external domain reputation, and content authenticity hints for voice, video, and text. * Auto-sandbox unknown communication channels. | First-contact flags, deepfake likelihood scores, mismatch between stated and observed channel metadata, operator decision latency. | Client-side pre-filtering of media, strip raw payloads after model inference, consent banners for recording and provenance display. | Insert a pre-access check before IdentityVerification: high-risk first contacts downgrade policy at PDP and force step-up verification. |
CFKC-S4: Credential priming and pressure | PEP, PA | Rate-limit authentication prompts and block prompt-bombing. Require proof-of-possession tokens bound to device attestation. * Enforce phishing-resistant flows (FIDO2/WebAuthn) for all privileged actions. | Spike in push denials, geovelocity anomalies, device attestation mismatch, token binding failures. | On-device proof-of-possession checks, discard raw device attestations after verification, keep hash-chained summaries only. | Strengthen IdentityVerification: if multi-prompt heuristics trip, short-circuit to DenyAccess and trigger NotifySecurityTeam. |
CFKC-S5: Policy evasion and lateral movement | PDP, PEP, PA | * Move policy evaluation into attested TEEs for high-value resources; expose signed policy digests. Dynamic least-privilege recomputation on session drift. | Policy-digest mismatch, unexpected resource graph traversal, anomalous East-West flows, time-to-privilege-escalation. | TEE-resident policy eval with minimal telemetry egress, differential privacy on movement heatmaps, 30-day retention for signed digests. | Bind ResourceAccessDecision to TEE-verified policy. If digest verification fails, force DenyAccess and log evidence. |
CFKC-S6: Data exfiltration and monetization | PEP, PDP | Content-aware egress controls with purpose tags. Token-bucket per subject-resource pair. * Real-time exfil classifiers on device for known templates and generative paraphrase. | Sudden entropy reduction in exports, paraphrase similarity to sensitive templates, covert channel signatures, breakout to unmanaged sinks. | Redact at source, on-device inference for exfil classifiers, store only policy decisions and hashes of exemplar matches. | Connect MonitorActivity to egress detectors. If ThreatDetected, call RevokeAccess and emit signed egress report. |
CFKC-S7: Cleanup and persistence | PA, PIP | Golden-image attestation at session end, privilege decay timers, and drift reconciliation of local policy caches. | Residual scheduled tasks, unexpected service registrations, policy-cache divergence, failed attestation on teardown. | Retain teardown attestations only, purge transient identifiers, rotate keys using short-lived credentials. | After RevokeAccess or normal end, require MonitorActivity to confirm teardown attestation and close evidence chain. |
Appendix F.2. Policy Checklist Derived from the Playbook
ID | Policy Setting | Rationale | Expected Benefit | Verification Metric and Method | Placement |
---|---|---|---|---|---|
1* | Cryptographically chained, write-once decision logs across PEP and PDP with hardware-anchored time stamps | Establish tamper-evident evidence for investigations and automated rescoring, bound by purpose and retention | Faster incident triage and reliable forensics that support continuous assurance under RQ6 | Evidence-chain completeness rate, median query latency for incident review, and absence of chain breaks in quarterly audits | PEP, PDP; Algorithm A1 MonitorActivity |
2 | First-contact downgrading with auto-sandbox for unknown external identities and channels | Reduce social engineering success by isolating untrusted flows while collecting provenance | Lower first-contact compromise rate and improved operator confidence | Reduction in first-contact grant decisions without step-up; mean time-to-detection for sandboxed flows | PEP, PDP; pre-IdentityVerification |
3 | Cooling-off periods for role elevation with attested device checks | Prevent rushed privilege changes under attacker pressure | Fewer privilege-escalation incidents and better change auditability | Count of elevation attempts within cooling windows that were blocked; false-positive rate | PA, PDP; ResourceAccessDecision |
4* | Phishing-resistant authentication for all privileged actions (FIDO2/WebAuthn with device-bound tokens) | Neutralize push fatigue and credential replay amplified by generative content | Step-change reduction in high-impact account takeovers | Rate of push-denial spikes; takeover incident rate; coverage percentage for FIDO across privileged roles | PEP; IdentityVerification |
5 | Relationship-provenance weighting in access scoring (recency, domain reputation, channel authenticity) | Make access risk-aware to social and organizational context | Lower acceptance of spoofed relationships and channels | AUC lift of access-scoring model with provenance features vs. baseline; approval reversal rate after manual review | PDP; ResourceAccessDecision |
6* | Policy evaluation in attested TEEs with published signed policy digests | Remove policy-tampering avenues and enable verifiable conformance | Stronger assurance for high-value resources and faster attestable audits | Share of decisions produced in TEEs; digest verification failure rate; p95 latency overhead | PDP; ResourceAccessDecision |
7 | Dynamic least-privilege recomputation on session drift (risk score, resource graph changes) | Constrain lateral movement accelerated by automated tooling | Lower dwell time and smaller blast radius | Median time-to-privilege-reduction after drift; percentage of sessions auto-downgraded | PDP, PEP; MonitorActivity |
8 | Egress token-bucket per subject-resource pair with content-aware classifiers on device | Throttle and detect exfiltration including paraphrase and format-shift | Fewer large-scale exfiltration events and better near-real-time containment | Number of blocked egress bursts; detection rate on holdout exfil templates; median revoke time | PEP; MonitorActivity and RevokeAccess |
9* | Evidence schemas and audit grammar that map decisions to NIST SP 800–207 objectives with human-actionable explanations | Improve explainability for denials and grants and standardize audits across teams | Faster exception handling and fewer misconfigurations | Decision-explanation coverage, operator resolution time, audit exception rate | PDP, PA; ResourceAccessDecision |
10 | On-device liveness scoring and immediate discard of raw biometrics after decision | Reduce privacy risk while increasing resistance to synthetic identity | Improved privacy posture without loss in liveness accuracy | False-accept and false-reject rates; retention audit of biometric artifacts | PEP; IdentityVerification |
11 | Query-burst caps and signed catalog requests for discovery endpoints | Limit unauthenticated reconnaissance and data staging | Reduction in scanning footprint and better early-stage detection | Unauthenticated scan rate, catalog query entropy distributions | PIP, PDP; ContextualInformation |
12* | Attested teardown with privilege decay timers and cache-drift reconciliation | Ensure sessions end cleanly and remove persistence footholds | Lower rate of residual privileges and shadow tasks | Percentage of sessions with verified teardown; divergence between local and central policy caches | PA, PEP; MonitorActivity |
13 | Privacy budgets and retention caps for telemetry with summarization at source | Bound data collection while maintaining detection efficacy | Reduced data exposure without material drop in detection | Detection AUC vs. privacy budget; retained-bytes trend vs. baseline | Evidence pipeline; cross-cuts PEP/PDP |
14 | Redaction of sensitive payloads prior to central processing with hash-chained summaries | Minimize central storage of raw content while preserving verifiability | Lower breach impact and simpler lawful basis management | Share of events with redacted payloads; verification success using summaries | Evidence pipeline; PEP |
15* | Continuous conformance tests using synthetic attack traces covering all CFKC stages | Keep policies fresh against new model exploits and regressions | Earlier detection of policy drift and exploitable gaps | Time-to-fail discovery after policy change; number of regressions caught pre-production | PA, PDP; CI/CD for policy; informs ResourceAccessDecision |
References
- Syed, N.F.; Shah, S.W.; Shaghaghi, A.; Anwar, A.; Baig, Z.; Doss, R. ZTA: A comprehensive survey. IEEE Access 2022, 10, 57143–57179. [Google Scholar] [CrossRef]
- Azad, M.A.; Abdullah, S.; Arshad, J.; Lallie, H.; Ahmed, Y.H. Verify and trust: A multidimensional survey of zero-trust security in the age of IoT. Internet Things 2024, 27, 101227. [Google Scholar] [CrossRef]
- Gupta, A.; Gupta, R.; Jadav, D.; Tanwar, S.; Kumar, N.; Shabaz, M. Proxy smart contracts for zero trust architecture implementation in Decentralised Oracle Networks based applications. Comput. Commun. 2023, 206, 10–21. [Google Scholar] [CrossRef]
- Rose, S.; Borchert, O.; Mitchell, S.; Connelly, S. Zero Trust Architecture. In NIST Special Publication; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. [Google Scholar] [CrossRef]
- Chen, H.; Babar, M.A. Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges. ACM Comput. Surv. 2024, 56, 1–38. [Google Scholar] [CrossRef]
- McIntosh, T.; Susnjak, T.; Liu, T.; Xu, D.; Watters, P.; Liu, D.; Hao, Y.; Ng, A.; Halgamuge, M. Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration. ACM Comput. Surv. 2024, 57, 1–40. [Google Scholar] [CrossRef]
- Nahar, N.; Andersson, K.; Schelén, O.; Saguna, S. A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks. IEEE Access 2024, 12, 94753–94764. [Google Scholar] [CrossRef]
- Itodo, C.; Ozer, M. Multivocal Literature Review on Zero-Trust Security Implementation. Comput. Secur. 2024, 141, 103827. [Google Scholar] [CrossRef]
- Buck, C.; Olenberger, C.; Schweizer, A.; Völter, F.; Eymann, T. Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust. Comput. Secur. 2021, 110, 102436. [Google Scholar] [CrossRef]
- Sarkar, S.; Choudhary, G.; Shandilya, S.K.; Hussain, A.; Kim, H. Security of zero trust networks in cloud computing: A comparative review. Sustainability 2022, 14, 11213. [Google Scholar] [CrossRef]
- Yan, X.; Wang, H. Survey on zero-trust network security. In Proceedings of the Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, 17–20 July 2020; Proceedings, Part I 6. Springer: Berlin/Heidelberg, Germany, 2020; pp. 50–60. [Google Scholar]
- Kang, H.; Liu, G.; Wang, Q.; Meng, L.; Liu, J. Theory and application of zero trust security: A brief survey. Entropy 2023, 25, 1595. [Google Scholar] [CrossRef]
- Dhiman, P.; Saini, N.; Gulzar, Y.; Turaev, S.; Kaur, A.; Nisa, K.U.; Hamid, Y. A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model. Sensors 2024, 24, 1328. [Google Scholar] [CrossRef] [PubMed]
- He, Y.; Huang, D.; Chen, L.; Ni, Y.; Ma, X. A survey on zero trust architecture: Challenges and future trends. Wirel. Commun. Mob. Comput. 2022, 2022, 6476274. [Google Scholar] [CrossRef]
- Stafford, V. Zero trust architecture. In NIST Special Publication; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. [Google Scholar]
- Kindervag, J. Build security into your network’s dna: The zero trust network architecture. Forrester Res. Inc. 2010, 27, 1–16. [Google Scholar]
- Ward, R.; Beyer, B. Beyondcorp: A new approach to enterprise security. Mag. Usenix Sage 2014, 39, 6–11. [Google Scholar]
- McIntosh, T.; Liu, T.; Susnjak, T.; Alavizadeh, H.; Ng, A.; Nowrozy, R.; Watters, P. Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation. Comput. Secur. 2023, 134, 103424. [Google Scholar] [CrossRef]
- Janssen, M.; Brous, P.; Estevez, E.; Barbosa, L.S.; Janowski, T. Data governance: Organizing data for trustworthy Artificial Intelligence. Gov. Inf. Q. 2020, 37, 101493. [Google Scholar] [CrossRef]
- Kampa, T.; Müller, C.K.; Großmann, D. Interlocking IT/OT security for edge cloud-enabled manufacturing. Ad Hoc Netw. 2024, 154, 103384. [Google Scholar] [CrossRef]
- Paya, A.; Gómez, A. Securesdp: A novel software-defined perimeter implementation for enhanced network security and scalability. Int. J. Inf. Secur. 2024, 23, 2793–2808. [Google Scholar] [CrossRef]
- Alevizos, L.; Ta, V.T.; Hashem Eiza, M. Augmenting zero trust architecture to endpoints using blockchain: A state-of-the-art review. Secur. Priv. 2022, 5, e191. [Google Scholar] [CrossRef]
- Bahmani, R.; Brasser, F.; Dessouky, G.; Jauernig, P.; Klimmek, M.; Sadeghi, A.R.; Stapf, E. CURE: A Security Architecture with Customizable and Resilient Enclaves. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021), Virtual Conference, 11–13 August 2021; pp. 1073–1090. [Google Scholar]
- Xu, K.; Chen, M.; Yue, S.; Zhang, F.; Wang, J.; Wen, Y.; Lü, G. The portal of OpenGMS: Bridging the contributors and users of geographic simulation resources. Environ. Model. Softw. 2024, 180, 106142. [Google Scholar] [CrossRef]
- McIntosh, T.; Kayes, A.; Chen, Y.P.; Ng, A.; Watters, P. Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions. ACM Comput. Surv. (CSUR) 2021, 54, 1–16. [Google Scholar] [CrossRef]
- Ali, B.; Hijjawi, S.; Campbell, L.H.; Gregory, M.A.; Li, S. A maturity framework for zero-trust security in multiaccess edge computing. Secur. Commun. Netw. 2022, 2022, 3178760. [Google Scholar] [CrossRef]
- Dekker, M.; Alevizos, L. A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision-making. Secur. Priv. 2024, 7, e333. [Google Scholar] [CrossRef]
- Al Shehhi, F.; Otoum, S. On the Feasibility of Zero-Trust Architecture in Assuring Security in Metaverse. In Proceedings of the 2023 International Conference on Intelligent Metaverse Technologies & Applications (iMETA), Tartu, Estonia, 18–20 September 2023; pp. 1–8. [Google Scholar]
- McIntosh, T.; Kayes, A.; Chen, Y.P.P.; Ng, A.; Watters, P. Dynamic user-centric access control for detection of ransomware attacks. Comput. Secur. 2021, 111, 102461. [Google Scholar] [CrossRef]
- McIntosh, T.; Kayes, A.; Chen, Y.P.; Ng, A.; Watters, P. Applying staged event-driven access control to combat ransomware. Comput. Secur. 2023, 128, 103160. [Google Scholar] [CrossRef]
- Ometov, A.; Petrov, V.; Bezzateev, S.; Andreev, S.; Koucheryavy, Y.; Gerla, M. Challenges of multi-factor authentication for securing advanced IoT applications. IEEE Netw. 2019, 33, 82–88. [Google Scholar] [CrossRef]
- Habbal, A.; Ali, M.K.; Abuzaraida, M.A. Artificial Intelligence Trust, risk and security management (AI trism): Frameworks, applications, challenges and future research directions. Expert Syst. Appl. 2024, 240, 122442. [Google Scholar] [CrossRef]
- Simpson, W.R.; Foltz, K.E. Network Segmentation and Zero Trust Architectures. In Proceedings of the Lecture Notes in Engineering and Computer Science, Proceedings of the World Congress on Engineering (WCE 2021), London, UK, 7–9 July 2021; pp. 201–206. [Google Scholar]
- Bello, Y.; Hussein, A.R.; Ulema, M.; Koilpillai, J. On sustained zero trust conceptualization security for mobile core networks in 5g and beyond. IEEE Trans. Netw. Serv. Manag. 2022, 19, 1876–1889. [Google Scholar] [CrossRef]
- Ramezanpour, K.; Jagannath, J. Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN. Comput. Netw. 2022, 217, 109358. [Google Scholar] [CrossRef]
- Gudala, L.; Shaik, M.; Venkataramanan, S. Leveraging Machine Learning for Enhanced Threat Detection and Response in Zero Trust Security Frameworks: An Exploration of Real-Time Anomaly Identification and Adaptive Mitigation Strategies. J. Artif. Intell. Res. 2021, 1, 19–45. [Google Scholar]
- Khamvilai, T.; Pakmehr, M. Zero Trust Avionics Systems (ZTAS). In Proceedings of the 2023 IEEE/AIAA 42nd Digital Avionics Systems Conference (DASC 2023), Barcelona, Spain, 1–5 October 2023; pp. 1–8. [Google Scholar]
- Zanasi, C.; Russo, S.; Colajanni, M. Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures. Ad Hoc Netw. 2024, 156, 103414. [Google Scholar] [CrossRef]
- Fernandez, E.B.; Brazhuk, A. A critical analysis of ZTA. Comput. Stand. Interfaces 2024, 89, 103832. [Google Scholar] [CrossRef]
- Edo, O.C.; Ang, D.; Billakota, P.; Ho, J.C. A zero trust architecture for health information systems. Health Technol. 2024, 14, 189–199. [Google Scholar] [CrossRef]
- Rivera, J.J.D.; Muhammad, A.; Song, W.C. Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication. IEEE Open J. Commun. Soc. 2024, 5, 2792–2814. [Google Scholar] [CrossRef]
- Chaturvedi, I.; Pawar, P.M.; Muthalagu, R.; Tamizharasan, P. Zero Trust Security Architecture for Digital Privacy in Healthcare. In Information Technology Security: Modern Trends and Challenges; Springer Nature: Singapore, 2024; pp. 1–23. [Google Scholar]
- Colomb, Y.; White, P.; Islam, R.; Alsadoon, A. Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud. In Emerging Trends in Cybersecurity Applications; Springer International Publishing: Cham, Switzerland, 2022; pp. 137–169. [Google Scholar]
- ElSayed, Z.; Elsayed, N.; Bay, S. A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation. SoutheastCon 2024, 2024, 686–692. [Google Scholar]
- Barzyk, C.; Hickson, J.; Ochoa, J.; Talley, J.; Willeke, M.; Coffey, S.; Pavlik, J.; Bastian, N.D. A Generative Artificial Intelligence Methodology for Automated Zero-Shot Data Tagging to Support Tactical Zero Trust Architecture Implementation. Ind. Syst. Eng. Rev. 2025, 12, 83–88. [Google Scholar] [CrossRef]
- Patil, K.; Desai, B.; Mehta, I.; Patil, A. A Contemporary Approach: Zero Trust Architecture for Cloud-Based Fintech Services. Innov. Comput. Sci. J. 2023, 9. [Google Scholar]
- Stanojevic, M.; Capko, D.; Lendak, I.; Stoja, S.; Jelacic, B. Fighting Insider Threats, with Zero-Trust in Microservice-based, Smart Grid OT Systems. Acta Polytech. Hung. 2023, 20, 229–248. [Google Scholar] [CrossRef]
- Leahy, D.; Thorpe, C. Zero trust container architecture (ztca): A framework for applying zero trust principals to docker containers. In Proceedings of the International Conference on Cyber Warfare and Security, Islamabad, Pakistan, 7–8 December 2022; Volume 17, pp. 111–120. [Google Scholar]
- Tsai, M.; Lee, S.; Shieh, S.W. Strategy for implementing of zero trust architecture. IEEE Trans. Reliab. 2024, 73, 93–100. [Google Scholar] [CrossRef]
- Din, I.U.; Khan, K.H.; Almogren, A.; Zareei, M.; Díaz, J.A.P. Securing the Metaverse: A Blockchain-Enabled Zero-Trust Architecture for Virtual Environments. IEEE Access 2024, 12, 92337–92347. [Google Scholar] [CrossRef]
- Ahmadi, S. Zero trust architecture in cloud networks: Application, challenges and future opportunities. J. Eng. Res. Rep. 2024, 26, 215–228. [Google Scholar] [CrossRef]
- Hussain, M.; Pal, S.; Jadidi, Z.; Foo, E.; Kanhere, S. Federated Zero Trust Architecture using Artificial Intelligence. IEEE Wirel. Commun. 2024, 31, 30–35. [Google Scholar] [CrossRef]
- Liu, Y.; Su, Z.; Peng, H.; Xiang, Y.; Wang, W.; Li, R. Zero Trust-Based Mobile Network Security Architecture. IEEE Wirel. Commun. 2024, 31, 82–88. [Google Scholar] [CrossRef]
- Chang, Y.C.; Lin, Y.S.; Sangaiahc, A.K.; Wu, H.T. A Private Blockchain System based on Zero Trust Architecture. In Proceedings of the 2024 26th International Conference on Advanced Communications Technology (ICACT), Pyeong Chang, Republic of Korea, 4–7 February 2024; pp. 143–146. [Google Scholar]
- Huber, B.; Kandah, F. Zero Trust+: A Trusted-based Zero Trust architecture for IoT at Scale. In Proceedings of the 2024 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 6–8 January 2024; pp. 1–6. [Google Scholar]
- Zhang, H.; Wang, Q.; Zhang, X.; He, Y.; Tang, B.; Li, Q. Toward Zero-Trust IoT Networks via Per-Packet Authorization. IEEE Commun. Mag. 2024, 62, 90–96. [Google Scholar] [CrossRef]
- Dhanapal, A.D.; Ramanujan, S.A.; Jeyalakshmi, V. Trust-Free Homes: The Zero-Trust Paradigm in a Smart Home Setting. In Communication Technologies and Security Challenges in IoT: Present and Future; Springer: Singapore, 2024; pp. 335–349. [Google Scholar]
- Guleri, A.; Singh, N.P.; Singh, P.; Lata, K. Siddu: Decentralized Authorization with Zero Trust. In Proceedings of the International Conference on Communications and Cyber Physical Engineering 2018, Hyderabad, India, 28–29 February 2024; pp. 213–221. [Google Scholar]
- Yang, Y.; Bai, F.; Yu, Z.; Shen, T.; Liu, Y.; Gong, B. An anonymous and supervisory cross-chain privacy protection protocol for zero-trust IoT application. ACM Trans. Sens. Netw. 2024, 20, 1–20. [Google Scholar] [CrossRef]
- Jamil, M.; Farhan, M.; Ullah, F.; Srivastava, G. A Lightweight Zero Trust Framework for Secure 5G VANET Vehicular Communication. IEEE Wirel. Commun. 2024, 31, 136–141. [Google Scholar] [CrossRef]
- Xu, X.; Zhou, X.; Zhou, X.; Bilal, M.; Qi, L.; Xia, X.; Dou, W. Distributed Edge Caching for Zero Trust-Enabled Connected and Automated Vehicles: A Multi-Agent Reinforcement Learning Approach. IEEE Wirel. Commun. 2024, 31, 36–41. [Google Scholar] [CrossRef]
- Nawshin, F.; Unal, D.; Hammoudeh, M.; Suganthan, P.N. AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks. Ad Hoc Netw. 2024, 161, 103523. [Google Scholar] [CrossRef]
- Nkoro, E.C.; Njoku, J.N.; Nwakanma, C.I.; Lee, J.M.; Kim, D.S. Zero-Trust Marine Cyberdefense for IoT-Based Communications: An Explainable Approach. Electronics 2024, 13, 276. [Google Scholar] [CrossRef]
- Farouk, A.; Al-Kuwari, S.; Abulkasim, H.; Mumtaz, S.; Adil, M.; Song, H. Quantum Computing: A Tool for Zero-trust Wireless Networks. IEEE Netw. 2024, 39, 140–148. [Google Scholar] [CrossRef]
- Javeed, D.; Saeed, M.S.; Adil, M.; Kumar, P.; Jolfaei, A. A federated learning-based zero trust intrusion detection system for Internet of Things. Ad. Hoc. Netw. 2024, 162, 103540. [Google Scholar] [CrossRef]
- Liu, C.; Tan, R.; Wu, Y.; Feng, Y.; Jin, Z.; Zhang, F.; Liu, Y.; Liu, Q. Dissecting zero trust: Research landscape and its implementation in IoT. Cybersecurity 2024, 7, 20. [Google Scholar] [CrossRef]
- Fang, H.; Zhu, Y.; Zhang, Y.; Wang, X. Decentralized Edge Collaboration for Seamless Handover Authentication in Zero-Trust IoV. IEEE Trans. Wirel. Commun. 2024, 23, 8760–8772. [Google Scholar] [CrossRef]
- Okegbile, S.D.; Cai, J.; Chen, J.; Yi, C. A Reputation-Enhanced Shard-Based Byzantine Fault-Tolerant Scheme for Secure Data Sharing in Zero Trust Human Digital Twin Systems. IEEE Internet Things J. 2024, 11, 22726–22741. [Google Scholar] [CrossRef]
- Al Shahrani, A.M.; Rizwan, A.; Sánchez-Chero, M.; Cornejo, L.L.C.; Shabaz, M. Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model. J. Supercomput. 2024, 80, 7849–7875. [Google Scholar] [CrossRef]
- Rasool, S.; Saleem, A.; ul Haq, M.I.; Jacobsen, R.H. Towards Zero Trust Security for Prosumer-Driven Verifiable Green Energy Certificates. In Proceedings of the 2024 7th International Conference on Energy Conservation and Efficiency (ICECE), Lahore, Pakistan, 6–7 March 2024; pp. 1–6. [Google Scholar]
- Cao, H.; Yang, L.; Garg, S.; Alrashoud, M.; Guizani, M. Softwarized resource allocation of tailored services with zero security trust in 6G networks. IEEE Wirel. Commun. 2024, 31, 58–65. [Google Scholar] [CrossRef]
- Sullivan, B.; Khan, J.A. OBSERVE: Blockchain-Based Zero Trust Security Protocol for Connected and Autonomous Vehicles (CAVs) Data Using Simple Machine Learning. In Proceedings of the 2024 International Conference on Computing, Networking and Communications (ICNC), Big Island, HI, USA, 19–22 February 2024; pp. 554–559. [Google Scholar]
- Trott, D. A zero-trust journey through the threat landscape. Netw. Secur. 2024, 2024, 2. [Google Scholar] [CrossRef]
- Zhu, L.; Huang, D.; Na, Y.; Li, X. Design and Stability Analysis of Vehicle Platooning Control in Zero-Trust Environment. In Proceedings of the 2024 IEEE 13th Data Driven Control and Learning Systems Conference (DDCLS), Kaifeng, China, 17–19 May 2024; pp. 2076–2081. [Google Scholar]
- Nakamura, S.; Takizawa, M. Trust zone model with the mandatory access control model. In Proceedings of the International Conference on Emerging Internet, Data & Web Technologies, Naples, Italy, 21–23 February 2024; pp. 512–521. [Google Scholar]
- Awan, K.A.; Din, I.U.; Almogren, A.; Kim, B.S.; Guizani, M. Enhancing IoT Security with Trust Management Using Ensemble XGBoost and AdaBoost Techniques. IEEE Access 2024, 12, 116609–116621. [Google Scholar] [CrossRef]
- Kumar, R.; Aljuhani, A.; Javeed, D.; Kumar, P.; Islam, S.; Islam, A.N. Digital twins-enabled zero touch network: A smart contract and explainable AI integrated cybersecurity framework. Future Gener. Comput. Syst. 2024, 156, 191–205. [Google Scholar] [CrossRef]
- Khan, M.J. Zero trust architecture: Redefining network security paradigms in the digital age. World J. Adv. Res. Rev. 2023, 19, 105–116. [Google Scholar] [CrossRef]
- Federici, F.; Martintoni, D.; Senni, V. A zero-trust architecture for remote access in industrial IoT infrastructures. Electronics 2023, 12, 566. [Google Scholar]
- Chen, X.; Feng, W.; Ge, N.; Zhang, Y. Zero trust architecture for 6G security. IEEE Netw. 2023, 38, 224–232. [Google Scholar] [CrossRef]
- Anderson, J.; Huang, Q.; Cheng, L.; Hu, H. A Zero Trust Architecture for Connected and Autonomous Vehicles. IEEE Internet Comput. 2023, 27, 7–14. [Google Scholar] [CrossRef]
- Bradatsch, L.; Miroshkin, O.; Kargl, F. ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture. IEEE Access 2023, 11, 125307–125327. [Google Scholar] [CrossRef]
- Wang, Z.; Jin, M.; Jiang, L.; Feng, C.; Cao, J.; Yun, Z. Secure access method of power internet of things based on zero trust architecture. In Proceedings of the International Conference on Swarm Intelligence, Shenzhen, China, 14–18 July 2023; pp. 386–399. [Google Scholar]
- Sedjelmaci, H.; Ansari, N. Zero trust architecture empowered attack detection framework to secure 6g edge computing. IEEE Netw. 2023, 38, 196–202. [Google Scholar] [CrossRef]
- Feng, X.; Hu, S. Cyber-physical zero trust architecture for industrial cyber-physical systems. IEEE Trans. Ind.-Cyber-Phys. Syst. 2023, 1, 394–405. [Google Scholar] [CrossRef]
- Xu, M.; Guo, J.; Yuan, H.; Yang, X. Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture. Electronics 2023, 12, 782. [Google Scholar] [CrossRef]
- Hong, S.; Xu, L.; Huang, J.; Li, H.; Hu, H.; Gu, G. SysFlow: Toward a programmable zero trust framework for system security. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2794–2809. [Google Scholar] [CrossRef]
- Kholidy, H.A.; Disen, K.; Karam, A.; Benkhelifa, E.; Rahman, M.A.; Rahman, A.U.; Almazyad, I.; Sayed, A.F.; Jaziri, R. Secure the 5G and beyond networks with zero trust and access control systems for cloud native architectures. In Proceedings of the 2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Giza, Egypt, 4–7 December 2023; pp. 1–8. [Google Scholar]
- Wang, J.; Chen, J.; Xiong, N.; Alfarraj, O.; Tolba, A.; Ren, Y. S-BDS: An effective blockchain-based data storage scheme in zero-trust IoT. ACM Trans. Internet Technol. 2023, 23, 1–23. [Google Scholar] [CrossRef]
- Tanque, M.; Foxwell, H.J. Cyber risks on IoT platforms and zero trust solutions. In Advances in Computers; Elsevier: Amsterdam, The Netherlands, 2023; Volume 131, pp. 79–148. [Google Scholar]
- Awale, V.; Gaikwad, S. Zero Trust Architecture Using Hyperledger Fabric. In Proceedings of the 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), Delhi, India, 6–8 July 2023; pp. 1–4. [Google Scholar]
- Huang, W.; Xie, X.; Wang, Z.; Feng, J.; Han, G.; Zhang, W. ZT-Access: A combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments. Ad Hoc Netw. 2023, 145, 103161. [Google Scholar] [CrossRef]
- Che, K.; Sheng, S. Cloud Native Network Security Architecture Strategy under Zero Trust Scenario. In Proceedings of the 2023 IEEE 7th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, China, 15–17 September 2023; Volume 7, pp. 867–871. [Google Scholar]
- Feng, Y.; Zhong, Z.; Sun, X.; Wang, L.; Lu, Y.; Zhu, Y. Blockchain enabled zero trust based authentication scheme for railway communication networks. J. Cloud Comput. 2023, 12, 62. [Google Scholar] [CrossRef]
- Dong, C.; Pal, S.; An, Q.; Yao, A.; Jiang, F.; Xu, Z.; Li, J.; Lu, M.; Song, Y.; Chen, S.; et al. Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture. In Proceedings of the 2023 IEEE International Conference on Blockchain (Blockchain), Hainan, China, 17–21 December 2023; pp. 315–322. [Google Scholar]
- Saleem, M.; Warsi, M.; Islam, S. Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment. J. Inf. Secur. Appl. 2023, 72, 103389. [Google Scholar] [CrossRef]
- Cheng, R.; Chen, S.; Han, B. Toward zero-trust security for the metaverse. IEEE Commun. Mag. 2023, 62, 156–162. [Google Scholar] [CrossRef]
- Wu, K.; Cheng, R.; Xu, H.; Tong, J. Design and Implementation of the Zero Trust Model in the Power Internet of Things. Int. Trans. Electr. Energy Syst. 2023, 2023, 6545323. [Google Scholar] [CrossRef]
- Wang, Z.; Yu, X.; Xue, P.; Qu, Y.; Ju, L. Research on medical security system based on zero trust. Sensors 2023, 23, 3774. [Google Scholar] [CrossRef]
- N’goran, K.R.; Brou, A.P.B.; Pandry, K.G.; Tetchueng, J.L.; Kermarrec, Y.; Asseu, O. Zero Trust Security Strategy for Collaboration Systems. In Proceedings of the 2023 International Symposium on Networks, Computers and Communications (ISNCC), Doha, Qatar, 23–26 October 2023; pp. 1–6. [Google Scholar]
- TN, N.; Pramod, D.; Singh, R. Zero trust security model: Defining new boundaries to organizational network. In Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, Noida, India, 3–5 August 2023; pp. 603–609. [Google Scholar]
- Wang, J.; Wang, Z.; Song, J.; Cheng, H. Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV. Electronics 2023, 12, 4825. [Google Scholar] [CrossRef]
- Ishihara, A.K.; Abdelbaky, M.; Shetye, S. Zero-Trust Architecture for Autonomous Edge Computing. In Proceedings of the Scitech 2023, Moscow, Russia, 28 November–1 December 2023. [Google Scholar]
- Mohseni Ejiyeh, A. Real-Time Lightweight Cloud-Based Access Control for Wearable IoT Devices: A Zero Trust Protocol. In Proceedings of the First International Workshop on Security and Privacy of Sensing Systems, Istanbul, Turkiye, 12–17 November 2023; pp. 22–29. [Google Scholar]
- Kobayashi, N. Zero Trust Security Framework for IoT Actuators. In Proceedings of the 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC), Torino, Italy, 27–29 June 2023; pp. 1285–1292. [Google Scholar]
- Ge, Y.; Zhu, Q. Gazeta: Game-theoretic zero-trust authentication for defense against lateral movement in 5g iot networks. IEEE Trans. Inf. Forensics Secur. 2023, 19, 540–554. [Google Scholar] [CrossRef]
- Jiang, H.; Chang, H.; Mukherjee, S.; Van der Merwe, J. OZTrust: An O-RAN Zero-Trust Security System. In Proceedings of the 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Dresden, Germany, 7–9 November 2023; pp. 129–134. [Google Scholar]
- Nwoyibe, O.I.; Philip, O.C.; Odi, A.C. Deployment of Zero Trust Access Security Model for Protection Against Cyber Crimes. IUP J. Comput. Sci. 2023, 17, 52–59. [Google Scholar]
- Anderson, J.; Huang, Q.; Cheng, L.; Hu, H. BYOZ: Protecting BYOD through zero trust network security. In Proceedings of the 2022 IEEE International Conference on Networking, Architecture and Storage (NAS), Philadelphia, PA, USA, 3–4 October 2022; pp. 1–8. [Google Scholar]
- Wang, L.; Ma, H.; Li, Z.; Pei, J.; Hu, T.; Zhang, J. A data plane security model of SR-BE/TE based on zero-trust architecture. Sci. Rep. 2022, 12, 20612. [Google Scholar] [CrossRef]
- Ameer, S.; Gupta, M.; Bhatt, S.; Sandhu, R. Bluesky: Towards convergence of zero trust principles and score-based authorization for iot enabled smart systems. In Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, New York, NY, USA, 8–10 June 2022; pp. 235–244. [Google Scholar]
- Li, D.; Zhang, E.; Lei, M.; Song, C. Zero trust in edge computing environment: A blockchain based practical scheme. Math. Biosci. Eng. 2022, 19, 4196–4216. [Google Scholar] [CrossRef]
- Liu, Y.; Hao, X.; Ren, W.; Xiong, R.; Zhu, T.; Choo, K.K.R.; Min, G. A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things. IEEE Trans. Comput. 2022, 72, 501–512. [Google Scholar] [CrossRef]
- Bandara, E.; Liang, X.; Shetty, S.; Mukkamala, R.; Rahman, A.; Keong, N.W. Skunk-A blockchain and zero trust security enabled federated learning platform for 5G/6G network slicing. In Proceedings of the 2022 19th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Virtual, 20–23 September 2022; pp. 109–117. [Google Scholar]
- Dhanaraj, R.K.; Singh, A.; Nayyar, A. Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network. Computing 2024, 106, 1933–1962. [Google Scholar] [CrossRef]
- Ouiazzane, S.; Addou, M.; Barramou, F. A Zero-Trust Model for Intrusion Detection in Drone Networks. Int. J. Adv. Comput. Sci. Appl 2023, 14, 525–537. [Google Scholar] [CrossRef]
- Pontes, D.; Silva, F.; Falcão, E.; Brito, A. Attesting AMD SEV-SNP Virtual Machines with SPIRE. In Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, La Paz, Bolivia, 16–18 October 2023; pp. 1–10. [Google Scholar]
- Repetto, M.; Carrega, A.; Rapuzzi, R. An architecture to manage security operations for digital service chains. Future Gener. Comput. Syst. 2021, 115, 251–266. [Google Scholar] [CrossRef]
- Zhang, J.; Zheng, J.; Zhang, Z.; Chen, T.; Qiu, K.; Zhang, Q.; Li, Y. Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture. Int. J. Intell. Syst. 2022, 37, 11167–11187. [Google Scholar] [CrossRef]
- Kroculick, J.B. Zero trust decision analysis for next generation networks. In Proceedings of the Disruptive Technologies in Information Sciences VIII, National Harbor, MA, USA, 21–25 April 2024; Volume 13058, pp. 278–286. [Google Scholar]
- Xie, H.; Wang, Y.; Ding, Y.; Yang, C.; Liang, H.; Qin, B. Industrial Wireless Internet Zero Trust Model: Zero Trust Meets Dynamic Federated Learning with Blockchain. IEEE Wirel. Commun. 2024, 31, 22–29. [Google Scholar] [CrossRef]
- Zhang, Q.Y.; Wu, G.R.; Yang, R.; Chen, J.Y. Digital image copyright protection method based on blockchain and zero trust mechanism. Multimed. Tools Appl. 2024, 83, 77267–77302. [Google Scholar] [CrossRef]
- Heino, J.; Jalio, C.; Hakkala, A.; Virtanen, S. JAPPI: An unsupervised endpoint application identification methodology for improved Zero Trust models, risk score calculations and threat detection. Comput. Netw. 2024, 250, 110606. [Google Scholar] [CrossRef]
- Raheman, F. Formulating and Supporting a Hypothesis to Address a Catch-22 Situation in 6G Communication Networks. J. Inf. Secur. 2024, 15, 340–354. [Google Scholar] [CrossRef]
- John, J.; John Singh, K. Trust value evaluation of cloud service providers using fuzzy inference based analytical process. Sci. Rep. 2024, 14, 18028. [Google Scholar] [CrossRef]
- Yeoh, W.; Liu, M.; Shore, M.; Jiang, F. Zero trust cybersecurity: Critical success factors and A maturity assessment framework. Comput. Secur. 2023, 133, 103412. [Google Scholar] [CrossRef]
- Ali, B.; Gregory, M.A.; Li, S. Trust-aware task load balancing in multi-access edge computing based on blockchain and a zero trust security capability framework. Trans. Emerg. Telecommun. Technol. 2023, 34, e4845. [Google Scholar] [CrossRef]
- Alalmaie, A.Z.; Nanda, P.; He, X. ZT-NIDS: Zero Trust, Network Intrusion Detection System. In Proceedings of the SECRYPT, Rome, Italy, 10–12 July 2023; pp. 99–110. [Google Scholar]
- Lv, Z.; Chen, C.; Zhang, Z.; Di, L.; Li, N. Zero-Trust Security Protection Architecture for Power Grid Based on FAHP Algorithm. In Proceedings of the 2nd International Conference on Internet of Things, Communication and Intelligent Technology, Xuzhou, China, 22–24 September 2023; pp. 49–61. [Google Scholar]
- Park, U.H.; Hong, J.h.; Kim, A.; Son, K.H. Endpoint Device Risk-Scoring Algorithm Proposal for Zero Trust. Electronics 2023, 12, 1906. [Google Scholar] [CrossRef]
- Yunanto, W.; Pao, H.K. User behavior Risk Evaluation in Zero Trust Architecture Environment. In Proceedings of the 2022 IEEE 8th World Forum on Internet of Things (WF-IoT), Yokohama, Japan, 26 October–11 November 2022; pp. 1–6. [Google Scholar]
- Pittman, J.M.; Alaee, S.; Crosby, C.; Honey, T.; Schaefer, G.M. Towards a model for zero trust data. Am. J. Sci. Eng. 2022, 3, 18–24. [Google Scholar] [CrossRef]
- García-Teodoro, P.; Camacho, J.; Maciá-Fernández, G.; Gómez-Hernández, J.A.; López-Marín, V.J. A novel zero-trust network access control scheme based on the security profile of devices and users. Comput. Netw. 2022, 212, 109068. [Google Scholar] [CrossRef]
- Ali, B.; Gregory, M.A.; Li, S.; Dib, O.A. Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing. Comput. Netw. 2024, 241, 110197. [Google Scholar] [CrossRef]
- Zyoud, B.; Lutfi, S.L. The Role of Information Security Culture in Zero Trust Adoption: Insights from UAE Organizations. IEEE Access 2024, 12, 72420–72444. [Google Scholar] [CrossRef]
- Khowaja, S.A.; Khuwaja, P.; Dev, K.; Singh, K.; Nkenyereye, L.; Kilper, D. ZETA: ZEro-Trust Attack Framework with Split Learning for Autonomous Vehicles in 6G Networks. In Proceedings of the 2024 IEEE Wireless Communications and Networking Conference (WCNC), Dubai, United Arab Emirates, 21–24 April 2024; pp. 1–6. [Google Scholar]
- Meng, L.; Huang, D.; An, J.; Zhou, X.; Lin, F. A continuous authentication protocol without trust authority for zero trust architecture. China Commun. 2022, 19, 198–213. [Google Scholar] [CrossRef]
- Xiao, S.; Ye, Y.; Kanwal, N.; Newe, T.; Lee, B. SoK: Context and risk aware access control for zero trust systems. Secur. Commun. Netw. 2022, 2022, 7026779. [Google Scholar] [CrossRef]
- Cao, Y.; Pokhrel, S.R.; Zhu, Y.; Doss, R.; Li, G. Automation and orchestration of zero trust architecture: Potential solutions and challenges. Mach. Intell. Res. 2024, 21, 294–317. [Google Scholar] [CrossRef]
- Liu, Z.; Li, X.; Mu, D. Data-Driven Zero Trust Key Algorithm. Wirel. Commun. Mob. Comput. 2022, 2022, 8659428. [Google Scholar] [CrossRef]
- Raheman, F. From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security. J. Comput. Commun. 2024, 12, 252–282. [Google Scholar] [CrossRef]
- Ma, Z.; Chen, X.; Sun, T.; Wang, X.; Wu, Y.C.; Zhou, M. Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization. Future Internet 2024, 16, 163. [Google Scholar] [CrossRef]
- Matiushin, I.; Korkhov, V. Continuous authentication methods for zero-trust cybersecurity architecture. In Proceedings of the International Conference on Computational Science and Its Applications, Athens, Greece, 3–6 July 2023; pp. 334–351. [Google Scholar]
- Hosney, E.S.; Halim, I.T.A.; Yousef, A.H. An artificial intelligence approach for deploying ZTA. In Proceedings of the 2022 5th International Conference on Computing and Informatics (ICCI), Cairo, Egypt, 9–10 March 2022; pp. 343–350. [Google Scholar]
- Singh, N.; Pal, S.; Leupers, R.; Merchant, F.; Rebeiro, C. PROMISE: A Programmable Hardware Monitor for Secure Execution in Zero Trust Networks. IEEE Embed. Syst. Lett. 2024, 16, 433–436. [Google Scholar] [CrossRef]
- Hasan, S.; Amundson, I.; Hardin, D. Zero-trust design and assurance patterns for cyber-physical systems. J. Syst. Archit. 2024, 155, 103261. [Google Scholar] [CrossRef]
- Liu, W.; Zhang, Z.; Qiao, X.; Li, Y.; Tan, Y.a.; Meng, W. A Software Integrity Authentication Protocol for Zero Trust Architecture. In Proceedings of the SIGCOMM Workshop on Zero Trust Architecture for Next Generation Communications, Sydney, Australia, 4 August 2024; pp. 1–6. [Google Scholar]
- Sharma, S.; Singh, J.; Gupta, A.; Ali, F.; Khan, F.; Kwak, D. User Safety and Security in the Metaverse: A Critical Review. IEEE Open J. Commun. Soc. 2024, 5, 5467–5487. [Google Scholar] [CrossRef]
- Munasinghe, S.; Piyarathna, N.; Wijerathne, E.; Jayasinghe, U.; Namal, S. Machine Learning Based Zero Trust Architecture for Secure Networking. In Proceedings of the 2023 IEEE 17th International Conference on Industrial and Information Systems (ICIIS), Peradeniya, Sri Lanka, 25–26 August 2023; pp. 1–6. [Google Scholar]
- Spencer, M.; Pizio, D. The de-perimeterisation of information security: The Jericho Forum, zero trust, and narrativity. Soc. Stud. Sci. 2023, 54, 655–677. [Google Scholar] [CrossRef]
- Shaik, M.; Gudala, L.; Sadhu, A.K.R. Leveraging Artificial Intelligence for Enhanced Identity and Access Management within Zero Trust Security Architectures: A Focus on User Behavior Analytics and Adaptive Authentication. Aust. J. Mach. Learn. Res. Appl. 2023, 3, 1–31. [Google Scholar]
- Qazi, F.A. Study of zero trust architecture for applications and network security. In Proceedings of the 2022 IEEE 19th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET), Marietta, GA, USA, 19–21 December 2022; pp. 111–116. [Google Scholar]
- Katsis, C.; Cicala, F.; Thomsen, D.; Ringo, N.; Bertino, E. NEUTRON: A graph-based pipeline for zero-trust network architectures. In Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, 24–27 April 2022; pp. 167–178. [Google Scholar]
- Guo, J.; Xu, M. ZTESA-A Zero-Trust Endogenous Safety Architecture: Gain the endogenous safety benefit, avoid insider threats. In Proceedings of the International Symposium on Computer Applications and Information Systems (ISCAIS 2022), Shenzhen, China, 25–27 February 2022; Volume 12250, pp. 192–202. [Google Scholar]
- Fang, L.; Wu, C.; Kang, Y.; Ou, W.; Zhou, D.; Ye, J. Zero-Trust-Based Protection Scheme for Users in Internet of Vehicles. Secur. Commun. Netw. 2022, 2022, 9896689. [Google Scholar] [CrossRef]
- Neale, C.; Kennedy, I.; Price, B.; Yu, Y.; Nuseibeh, B. The case for zero trust digital forensics. Forensic Sci. Int. Digit. Investig. 2022, 40, 301352. [Google Scholar] [CrossRef]
- Pigola, A.; de Souza Meirelles, F.; da Costa, P.R.; Porto, G.S. Trust in information security technology: An intellectual property analysis. World Pat. Inf. 2024, 78, 102281. [Google Scholar] [CrossRef]
- Asad, M.; Otoum, S. Integrative Federated Learning and Zero-Trust Approach for Secure Wireless Communications. IEEE Wirel. Commun. 2024, 31, 14–20. [Google Scholar] [CrossRef]
- Tang, F.; Ma, C.; Cheng, K. Privacy-preserving authentication scheme based on zero trust architecture. Digit. Commun. Netw. 2023, 10, 1211–1220. [Google Scholar] [CrossRef]
- Li, P.; Ou, W.; Liang, H.; Han, W.; Zhang, Q.; Zeng, G. A zero trust and blockchain-based defense model for smart electric vehicle chargers. J. Netw. Comput. Appl. 2023, 213, 103599. [Google Scholar] [CrossRef]
- Rivera, J.J.D.; Akbar, W.; Khan, T.A.; Muhammad, A.; Song, W.C. Secure enrollment token delivery mechanism for zero trust networks using blockchain. IEICE Trans. Commun. 2023, 106, 1293–1301. [Google Scholar] [CrossRef]
- West, R.W.; Van der Merwe, J. dNextG: A Zero-Trust Decentralized Mobile Network User Plane. In Proceedings of the 19th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Montreal, QC, Canada, 30 October–3 November 2023; pp. 15–24. [Google Scholar]
- Adahman, Z.; Malik, A.W.; Anwar, Z. An analysis of zero-trust architecture and its cost-effectiveness for organizational security. Comput. Secur. 2022, 122, 102911. [Google Scholar] [CrossRef]
- Phiayura, P.; Teerakanok, S. A comprehensive framework for migrating to zero trust architecture. IEEE Access 2023, 11, 19487–19511. [Google Scholar] [CrossRef]
- Singh, R.; Srivastav, G.; Kashyap, R.; Vats, S. Study on Zero-Trust Architecture, Application Areas & Challenges of 6G Technology in Future. In Proceedings of the 2023 International Conference on Disruptive Technologies (ICDT), Greater Noida, India, 11–12 May 2023; pp. 375–380. [Google Scholar]
- Liu, Y.; Xing, X.; Tong, Z.; Lin, X.; Chen, J.; Guan, Z.; Wu, Q.; Susilo, W. Secure and scalable cross-domain data sharing in zero-trust cloud-edge-end environment based on sharding blockchain. IEEE Trans. Dependable Secur. Comput. 2023, 21, 2603–2618. [Google Scholar] [CrossRef]
- Alagappan, A.; Venkatachary, S.K.; Andrews, L.J.B. Augmenting Zero Trust Network Architecture to enhance security in virtual power plants. Energy Rep. 2022, 8, 1309–1320. [Google Scholar] [CrossRef]
- Gaber, M.G.; Ahmed, M.; Janicke, H. Malware detection with artificial intelligence: A systematic literature review. ACM Comput. Surv. 2024, 56, 1–33. [Google Scholar] [CrossRef]
- Deng, G.; Liu, Y.; Mayoral-Vilches, V.; Liu, P.; Li, Y.; Xu, Y.; Zhang, T.; Liu, Y.; Pinzger, M.; Rass, S. {PentestGPT}: Evaluating and harnessing large language models for automated penetration testing. In Proceedings of the 33rd USENIX Security Symposium (USENIX Security 24), Philadelphia, PA, USA, 14–16 August 2024; pp. 847–864. [Google Scholar]
- Masood, M.; Nawaz, M.; Malik, K.M.; Javed, A.; Irtaza, A.; Malik, H. Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and way forward. Appl. Intell. 2023, 53, 3974–4026. [Google Scholar] [CrossRef]
- Liang, C.; Du, H.; Sun, Y.; Niyato, D.; Kang, J.; Zhao, D.; Imran, M.A. Generative AI-driven semantic communication networks: Architecture, technologies and applications. IEEE Trans. Cogn. Commun. Netw. 2024, 11, 27–47. [Google Scholar] [CrossRef]
- Wang, M.; Yang, N.; Forcade-Perkins, N.J.; Weng, N. Progen: Projection-based adversarial attack generation against network intrusion detection. IEEE Trans. Inf. Forensics Secur. 2024, 19, 5476–5491. [Google Scholar] [CrossRef]
- Klasén, L.; Fock, N.; Forchheimer, R. The invisible evidence: Digital forensics as key to solving crimes in the digital age. Forensic Sci. Int. 2024, 362, 112133. [Google Scholar] [CrossRef]
- Aboukadri, S.; Ouaddah, A.; Mezrioui, A. Machine learning in identity and access management systems: Survey and deep dive. Comput. Secur. 2024, 139, 103729. [Google Scholar] [CrossRef]
- McIntosh, T.R.; Susnjak, T.; Liu, T.; Watters, P.; Xu, D.; Liu, D.; Nowrozy, R.; Halgamuge, M.N. From cobit to iso 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models. Comput. Secur. 2024, 144, 103964. [Google Scholar] [CrossRef]
- Fang, W.; Guan, X. Research on iOS remote security access technology based on zero trust. In Proceedings of the 2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, China, 4–6 March 2022; Volume 6, pp. 238–241. [Google Scholar]
- Du, X.; Hargreaves, C.; Sheppard, J.; Scanlon, M. TraceGen: User activity emulation for digital forensic test image generation. Forensic Sci. Int. Digit. Investig. 2021, 38, 301133. [Google Scholar] [CrossRef]
- Begou, N.; Vinoy, J.; Duda, A.; Korczyński, M. Exploring the dark side of ai: Advanced phishing attack design and deployment using chatgpt. In Proceedings of the 2023 IEEE Conference on Communications and Network Security (CNS), Orlando, FL, USA, 2–5 October 2023; pp. 1–6. [Google Scholar]
- Ayoobi, N.; Shahriar, S.; Mukherjee, A. The looming threat of fake and llm-generated linkedin profiles: Challenges and opportunities for detection and prevention. In Proceedings of the 34th ACM Conference on Hypertext and Social Media, Rome, Italy, 4–8 September 2023; pp. 1–10. [Google Scholar]
- Frankovits, G.; Mirsky, Y. Discussion paper: The threat of real time deepfakes. In Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, Melbourne, VIC, Australia, 10–14 July 2023; pp. 20–23. [Google Scholar]
- Schmitt, M.; Flechais, I. Digital Deception: Generative artificial intelligence in social engineering and phishing. Artif. Intell. Rev. 2024, 57, 1–23. [Google Scholar] [CrossRef]
- Chen, Y.; Cui, M.; Wang, D.; Cao, Y.; Yang, P.; Jiang, B.; Lu, Z.; Liu, B. A survey of large language models for cyber threat detection. Comput. Secur. 2024, 145, 104016. [Google Scholar] [CrossRef]
- Zhao, C.; Du, H.; Niyato, D.; Kang, J.; Xiong, Z.; Kim, D.I.; Shen, X.; Letaief, K.B. Generative AI for secure physical layer communications: A survey. IEEE Trans. Cogn. Commun. Netw. 2024, 11, 3–26. [Google Scholar] [CrossRef]
- Mirsky, Y.; Demontis, A.; Kotak, J.; Shankar, R.; Gelei, D.; Yang, L.; Zhang, X.; Pintor, M.; Lee, W.; Elovici, Y.; et al. The threat of offensive ai to organizations. Comput. Secur. 2023, 124, 103006. [Google Scholar] [CrossRef]
Reference | Date | NIST Zero Trust Architecture 800-207 | Consideration of AI Risk Management | Structured Synthesis | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Variations of ZTA Approaches | Deployed Variations of the Abstract Architecture | Trust Algorithm | Network/Environment Components | ISO 42001 | NIST AI RMF | EU AI Act | Domain/Scope | Methodology | Evidence/ Validation | Key Limitations | ||
[11] | Q1 2020 | ✓ | ✓ | ✓ | Big data, IoT, networks | Narrative survey | Limited (no deployments) | Minimal real-world challenges; no compliance evolution | ||||
[12] | Q4 2020 | ✓ | Conceptual/theory | Conceptual review | None reported | Lacks behavioral trust and continuous monitoring | ||||||
[9] | Q3 2021 | ✓ | ✓ | Strategy/policy | Conceptual review | None reported | Strategic focus; no deployment guidance | |||||
[14] | Q2 2022 | ✓ | IoT/big data | Narrative survey | Limited | Sparse performance analysis; integration gaps | ||||||
[1] | Q2 2022 | ✓ | Enterprise/general | Narrative survey | None reported | Little on adaptive controls or case studies | ||||||
[10] | Q3 2022 | ✓ | ✓ | Cloud computing | Comparative review | Limited | Missing empirical benchmarks and performance metrics | |||||
[7] | Q1 2023 | ✓ | ✓ | ✓ | 6G/mobile | Systematic-style survey | Limited | Deployment challenges under-addressed | ||||
[13] | Q4 2023 | ✓ | ✓ | ✓ | ✓ | General/enterprise | Review | Partial (high-level) | Needs case studies and reproducible data | |||
[8] | Q1 2024 | ✓ | ✓ | Industry/ practitioner views | Multivocal review | Limited | Practitioner breadth; scarce empirical validation | |||||
[2] | Q2 2024 | ✓ | ✓ | Governance/ verification | Position/verification-oriented survey | Limited | Narrow scope; limited deployment coverage | |||||
This survey | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Generative-AI risk to ZTA | Critical survey + mapping | Pilot evidence (Appendices) | Addresses AI-driven erosion; proposes CFKC and agenda |
Criteria | Good (1) | Pass (0.5) | Fail (0) |
---|---|---|---|
Academic rigor and scientific soundness | Indicators: Clear research question; methods justified and aligned to question; dataset or corpus described with sampling and inclusion criteria; statistical tests or formal models reported with effect sizes or confidence intervals where applicable; threats to validity enumerated. Thresholds: ≥3 of 4 documentation elements present (design, data, analysis, validity); formal analysis reproducibly specified or theoretically grounded. Example: An ablation study of a trust model with effect sizes and a validity section. | Indicators: Method description present yet partial; dataset mentioned but sampling or inclusion criteria missing; some analysis reported without effect sizes; high-level validity note. Thresholds: 2 of 4 documentation elements present. Example: Architecture paper with informal benchmarking and brief limitations. | Indicators: Objectives vague or absent; methods unclear; no analysis or unverifiable claims; no validity discussion. Thresholds: ≤1 of 4 documentation elements present. Example: Concept sketch with narrative assertions only. |
Completeness of the three ZTA core principles (“Know when to verify”, “How to verify”, “Validate verification”) | Indicators: All three principles specified and connected to control points; trigger logic for verification, verification mechanisms, and post-decision validation or monitoring described. Thresholds: All 3 principles covered with concrete mechanisms or policies. Example: A system defines risk triggers, FIDO2 step-up, and session-level post-decision checks. | Indicators: Two principles meaningfully covered; the third implicit or under-specified. Thresholds: 2 of 3 principles with at least one concrete mechanism. Example: Risk triggers and verification described but no post-decision validation. | Indicators: One or none of the principles addressed; no tie to enforcement points. Thresholds: ≤1 principle covered. Example: Policy narrative without triggers or validation path. |
Result replicability and code up-to-dateness | Indicators: Public code or artifacts; pinned dependencies; seeds or configuration files; data access instructions or synthetic data generator; environment details. Thresholds: Code or artifacts publicly accessible and buildable; last update within 18 months of publication; successful re-run instructions. Example: Repository with Dockerfile and CI manifest that reproduces key tables. | Indicators: Partial artifacts or pseudo-code; external dependency list without pins; data available on request. Thresholds: Some artifacts exist but cannot reproduce all results; last update older than 18 months or missing pins. Example: Code shared yet requires manual fixes to run. | Indicators: No artifacts; proprietary data without a synthetic substitute; insufficient environment detail. Thresholds: Nothing usable to re-run analyses. Example: Closed implementation with unverifiable metrics. |
Implementation versatility | Indicators: Demonstrates portability across at least two distinct environments or vendors; documents integration paths for SaaS/PaaS/on-prem; configurable policies. Thresholds: Evidence of cross-environment deployment or a neutral reference architecture with mappings. Example: Prototype validated on Kubernetes and an on-prem gateway with the same policy language. | Indicators: Runs in one environment with claims of portability; partial mapping to other stacks. Thresholds: Single-environment implementation with portability notes but no second deployment. Example: Cloud-only prototype with future on-prem plans. | Indicators: Hard-wired to a single stack; cannot adapt to other control planes; vendor-locked assumptions. Thresholds: No portability evidence or mapping. Example: Custom gateway with nonstandard policies and no adapters. |
Practicality | Indicators: Reports end-to-end latency or throughput; resource use on target hardware; operator workload impact; deployment constraints; cost or scaling notes. Thresholds: At least two quantitative operational metrics (for example, p95 latency and CPU or memory) or a documented SLO; clear deployment prerequisites. Example: Access decision p95 ≤ 200 ms on commodity hardware with operator runbook. | Indicators: Qualitative claims of performance or usability; one quantitative metric without context. Thresholds: Some indication of feasibility without full operational picture. Example: “Low overhead” claim with a single median latency value. | Indicators: No operational metrics; ignores operator or cost considerations; cannot infer feasibility. Thresholds: No quantitative practicality evidence. Example: Algorithm-only study without deployment envelope. |
Research ethics | Indicators: Self-disclosed limitations; bias and threat discussion; dataset licensing and consent statements where human data are involved; security disclosure posture; clear future work. Thresholds: Explicit limitations and bias section plus data use or disclosure statements when applicable. Example: Paper documents sampling bias and provides an IRB or equivalent statement. | Indicators: Mentions some limitations or bias; omits data handling details or disclosure posture. Thresholds: Partial coverage of ethical dimensions. Example: Limitations paragraph without data licensing notes. | Indicators: No discussion of limitations, bias, or data use; no disclosure posture; unsafe release practices. Thresholds: Ethical aspects absent. Example: Uses scraped personal data with no consent or licensing. |
Threat Family | Dominant Model Class | ZTA Component(s) at Risk | ZT Principle(s) Eroded | Representative Empirical Evidence (with Triangulation Note if Industry/IR) | Source Type |
---|---|---|---|---|---|
Synthetic–identity fabrication | Diffusion/GAN face, document and voice generators; LLM résumé writers | Identity governance; High-performance authentication & authorisation | Verify explicitly; Continuous assessment | Controlled eKYC studies report StyleGAN faces defeating liveness; Sumsub 2024 measures a two-fold rise in deep-fake onboarding attempts; Gaber et al. [168] show synthetic-voice spoofing of speaker verification. (Industry metric corroborates peer-reviewed mechanism.) | Mixed |
Automated spear-phishing | Instruction-tuned LLMs (e.g. GPT-4-turbo, WormGPT) | Risk/behavior/context trust algorithms; Secure communications | Assume breach; Context-aware access | MITRE ATLAS reports LLM-crafted pretexts doubling click-through in exercises; Deng et al. [169] achieve >60% compiler-correct payload delivery through gateways. (Industry exercise aligns with academic red-teaming.) | Mixed |
Deep-fake executive impersonation | Transformer TTS; diffusion video synthesis | Continuous monitoring; Behavioral analytics | Verify explicitly; Least-privilege | Masood et al. [170] quantify sub-100 ms cloning latency enabling live calls; telecom red-team exercises note help-desk resets triggered by audio impostors despite MFA. (Industry vignette triangulates lab feasibility.) | Mixed |
Adversarial policy evasion | RL agents leveraging code-gen LLMs | Micro-segmentation; Policy decision points; SDP | Assume breach; Least-privilege | Deng et al. [169] show agents discovering lateral routes across Kubernetes namespaces in ≈90 s; Liang et al. [171] simulate agents satisfying SDP handshakes while replaying benign telemetry. | Peer-reviewed |
Covert exfiltration | Code-generating LLMs with steganographic / protocol-mimic channels | Secure communication; Continuous monitoring; Resilient network | Inspect & log all traffic | Liang et al. [171] construct GAN-shaped TLS flows that bypass DLP with 81% success; Wang et al. [172] craft adversarial traffic that evades six ML NIDS across three public datasets. | Peer-reviewed |
Adaptive-trust poisoning | Generative adversarial policies; data-poisoning GANs | Adaptive / multi-factor trust algorithms | Integrity of dynamic trust scoring | Klasén et al. [173] show synthetic telemetry increasing behavior-model false-negatives; Aboukadri et al. [174] survey persistent GAN-based spoofing against face/voice pipelines. | Peer-reviewed |
High-Priority Tasks—Immediate Risk Reduction |
---|
H1 behavioral-based trust analytics |
Design lightweight, privacy-preserving models that learn per-user baselines and detect AI-generated micro-behavioral drift without relying on static rules. |
H2 Tamper-proof continuous monitoring |
Engineer end-to-end verifiable telemetry: write-once logging with cryptographic chaining, hardware-anchored timestamps, and real-time anomaly scoring that supports purpose limitation, on-device summarization, and configurable privacy budgets. Provide audit-ready evidence schemas and operator-in-the-loop overrides without excessive data centralization. |
H3 Adversarially robust identity proofing |
Evaluate face, voice, and text authentication pipelines against diffusion and LLM attacks; build certification suites for model robustness. |
H4 Policy enclaves with hardware roots of trust |
Move policy-decision points and critical verifiers into attested TEEs, then characterize throughput, p50/p95 latency, failover behavior, and side-channel exposure under production-like loads. Define upgrade and key-rotation procedures and expose verifiable policy digests to the monitoring plane. |
H5 Explainable AI-governed GRC |
Embed compact, human-actionable rationales into access decisions and align audit grammars to NIST SP 800-207 control objectives. Use ISO 42001 and NIST AI RMF clauses to shape auditability, while making clear that these are generic AI governance instruments and do not, by themselves, remove generative-AI erosion of zero trust. |
Medium-priority tasks—strategic improvements |
M1 Resource-efficient defense models |
Prune and quantize detectors so that edge devices enforce zero trust without GPU dependence. |
M2 Automated AI red-teaming frameworks |
Generate configurable, reproducible fraud campaigns that stress all seven CFKC stages against candidate defenses. |
M3 Cloud–edge ZTA orchestration |
Develop policy languages that span SaaS, PaaS, and on-prem enclaves while guaranteeing least-privilege paths under dynamic workloads. |
M4 Socio-technical operator training |
Build simulation environments that expose analysts to deepfake-enabled social engineering and measure decision latency. |
M5 AI-assisted attribution pipelines |
Correlate multilingual LLM output, blockchain analytics, and network telemetry to shorten fraud attribution cycles. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Xu, D.; Gondal, I.; Yi, X.; Susnjak, T.; Watters, P.; McIntosh, T.R. The Erosion of Cybersecurity Zero-Trust Principles Through Generative AI: A Survey on the Challenges and Future Directions. J. Cybersecur. Priv. 2025, 5, 87. https://doi.org/10.3390/jcp5040087
Xu D, Gondal I, Yi X, Susnjak T, Watters P, McIntosh TR. The Erosion of Cybersecurity Zero-Trust Principles Through Generative AI: A Survey on the Challenges and Future Directions. Journal of Cybersecurity and Privacy. 2025; 5(4):87. https://doi.org/10.3390/jcp5040087
Chicago/Turabian StyleXu, Dan, Iqbal Gondal, Xun Yi, Teo Susnjak, Paul Watters, and Timothy R. McIntosh. 2025. "The Erosion of Cybersecurity Zero-Trust Principles Through Generative AI: A Survey on the Challenges and Future Directions" Journal of Cybersecurity and Privacy 5, no. 4: 87. https://doi.org/10.3390/jcp5040087
APA StyleXu, D., Gondal, I., Yi, X., Susnjak, T., Watters, P., & McIntosh, T. R. (2025). The Erosion of Cybersecurity Zero-Trust Principles Through Generative AI: A Survey on the Challenges and Future Directions. Journal of Cybersecurity and Privacy, 5(4), 87. https://doi.org/10.3390/jcp5040087