Zero Trust for Intrusion Detection System: A Systematic Literature Review

0Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Organizations today are facing increasing cybersecurity challenges by moving more services to the cloud and outsourcing Intrusion Detection System (IDS) network monitoring tasks to third-party analysts. Zero Trust models may mitigate these challenges by employing the philosophy of “Never Trust, Always Verify.” However, specific anonymization approaches are required to ensure information integrity while preserving privacy. This paper reviews the existing approaches identified in the literature, compares them, and assesses the privacy-accuracy trade-offs. Plus, we have discussed future research directions and knowledge gaps.

Cite

CITATION STYLE

APA

Alalmaie, A. Z., Waheed, N., Alalyan, M., Nanda, P., Jia, W., & He, X. (2024). Zero Trust for Intrusion Detection System: A Systematic Literature Review. In International Conference on Agents and Artificial Intelligence (Vol. 3, pp. 170–177). Science and Technology Publications, Lda. https://doi.org/10.5220/0012312300003636

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free