
International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 2
April-June 2025
Indexing Partners



















AI-Powered Cyber Defense: Combining Zero Trust, De-Identification, and Autonomous Threat Response
Author(s) | Mukul Mangla, Saurabh Kansal |
---|---|
Country | India |
Abstract | As cyberattacks become more advanced, businesses need smarter and more flexible ways to protect themselves—traditional firewalls and perimeter-based defenses just aren’t enough anymore. This paper introduces a new cybersecurity system that uses artificial intelligence (AI) to combine several cutting-edge approaches: Zero Trust Architecture (which always verifies user access), data de-identification (which protects personal information), and automated threat response (which reacts to attacks without human delay). The system includes modern features like behavior analysis to detect risky activity, AI models that are resistant to manipulation, and tools that help explain how security decisions are made. It also uses blockchain to keep a transparent record of what actions were taken and why. We tested this approach on a simulated dataset of 1.2 million entries and ran pilot programs in the finance and healthcare sectors. The results showed clear benefits: threat detection accuracy improved by 28%, false alarms were cut nearly in half, response times dropped by 45%, and privacy compliance went up by 18%. The system ran efficiently, adding only 12% CPU usage and keeping its AI response times under 150 milliseconds for most requests. Future improvements will focus on running the system on edge devices, training models securely across multiple locations using federated learning, and preparing it to resist even the most advanced future threats, including those posed by quantum computing. Overall, this research marks real progress in building smarter, more secure, and privacy-aware defense systems. |
Keywords | AI-Powered Cybersecurity, Zero Trust Architecture (ZTA) , Autonomous Threat Response , Data De-Identification , Behavioral Analytics , Adversarial Robustness ,Explainable AI (XAI) , Differential Privacy , Security Orchestration, Automation, and Response (SOAR) , Blockchain Auditability |
Field | Computer > Network / Security |
Published In | Volume 16, Issue 2, April-June 2025 |
Published On | 2025-06-02 |
DOI | https://doi.org/10.71097/IJSAT.v16.i2.5834 |
Short DOI | https://doi.org/g9m289 |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
