Research Article

AI-Driven Adaptive Zero-Trust Models for U.S. Defense Networks

Authors

  • Md Fahim Ahammed Department of Information Assurance and Cybersecurity, Gannon University, Erie, Pennsylvania, USA
  • Md Rasheduzzaman Labu Department of Information Assurance and Cybersecurity, Gannon University, Erie, Pennsylvania, USA

Abstract

The dynamically changing cybersecurity landscape in the USA demands a much more robust Identity Access management approach. At the core of this evolution lies the trust mode of security relies on the never-trusted-always-verify principles, turning it into one of the leading ways to plan how access to crucial resources should be secured. This study investigates the use of Artificial Intelligence in improving Identity Access Management through User Behavioral Analytics and adaptive authentication at Zero Trust Architecture. AI-driven User Behavioral Analytics was singled out as one of the transformative tools in the continuous monitoring and analysis of user behavioral patterns. Through the use of ML algorithms, baseline activity metrics are set up: time of login, location, device attribute, and what resource he or she tried to access. It flags deviations from these baselines as potential anomalies, requiring further scrutiny and possible security actions. This proactive approach to anomaly detection greatly strengthens Identity Access Management within a Zero Trust context by allowing an organization in the USA to identify and address such threats in real time.

Article information

Journal

Journal of Computer Science and Technology Studies

Volume (Issue)

7 (6)

Pages

485-493

Published

2025-06-15

How to Cite

Md Fahim Ahammed, & Md Rasheduzzaman Labu. (2025). AI-Driven Adaptive Zero-Trust Models for U.S. Defense Networks. Journal of Computer Science and Technology Studies, 7(6), 485-493. https://doi.org/10.32996/jcsts.2025.7.6.56

Downloads

Views

0

Downloads

0

Keywords:

Zero Trust models; AI-Powered Behavioral Analytics; Identity Access Management; Multi-Factor Authentication; Adaptive Authentication