Abstract
Organizations today are facing increasing cybersecurity challenges by moving more services to the cloud and outsourcing Intrusion Detection System (IDS) network monitoring tasks to third-party analysts. Zero Trust models may mitigate these challenges by employing the philosophy of “Never Trust, Always Verify.” However, specific anonymization approaches are required to ensure information integrity while preserving privacy. This paper reviews the existing approaches identified in the literature, compares them, and assesses the privacy-accuracy trade-offs. Plus, we have discussed future research directions and knowledge gaps.
Author supplied keywords
Cite
CITATION STYLE
Alalmaie, A. Z., Waheed, N., Alalyan, M., Nanda, P., Jia, W., & He, X. (2024). Zero Trust for Intrusion Detection System: A Systematic Literature Review. In International Conference on Agents and Artificial Intelligence (Vol. 3, pp. 170–177). Science and Technology Publications, Lda. https://doi.org/10.5220/0012312300003636
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.