International Journal on Science and Technology

E-ISSN: 2229-7677     Impact Factor: 9.88

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 16 Issue 2 April-June 2025 Submit your research before last 3 days of June to publish your research paper in the issue of April-June.

AI-Powered Cyber Defense: Combining Zero Trust, De-Identification, and Autonomous Threat Response

Author(s) Mukul Mangla, Saurabh Kansal
Country India
Abstract As cyberattacks become more advanced, businesses need smarter and more flexible ways to protect themselves—traditional firewalls and perimeter-based defenses just aren’t enough anymore. This paper introduces a new cybersecurity system that uses artificial intelligence (AI) to combine several cutting-edge approaches: Zero Trust Architecture (which always verifies user access), data de-identification (which protects personal information), and automated threat response (which reacts to attacks without human delay).
The system includes modern features like behavior analysis to detect risky activity, AI models that are resistant to manipulation, and tools that help explain how security decisions are made. It also uses blockchain to keep a transparent record of what actions were taken and why.
We tested this approach on a simulated dataset of 1.2 million entries and ran pilot programs in the finance and healthcare sectors. The results showed clear benefits: threat detection accuracy improved by 28%, false alarms were cut nearly in half, response times dropped by 45%, and privacy compliance went up by 18%. The system ran efficiently, adding only 12% CPU usage and keeping its AI response times under 150 milliseconds for most requests.
Future improvements will focus on running the system on edge devices, training models securely across multiple locations using federated learning, and preparing it to resist even the most advanced future threats, including those posed by quantum computing. Overall, this research marks real progress in building smarter, more secure, and privacy-aware defense systems.
Keywords AI-Powered Cybersecurity, Zero Trust Architecture (ZTA) , Autonomous Threat Response , Data De-Identification , Behavioral Analytics , Adversarial Robustness ,Explainable AI (XAI) , Differential Privacy , Security Orchestration, Automation, and Response (SOAR) , Blockchain Auditability
Field Computer > Network / Security
Published In Volume 16, Issue 2, April-June 2025
Published On 2025-06-02
DOI https://doi.org/10.71097/IJSAT.v16.i2.5834
Short DOI https://doi.org/g9m289

Share this