Zero Trust for Intrusion Detection System: A Systematic Literature Review
- Publisher:
- INSTICC
- Publication Type:
- Conference Proceeding
- Citation:
- International Conference on Agents and Artificial Intelligence, 2024, 3, pp. 170-177
- Issue Date:
- 2024-01-01
Open Access
Copyright Clearance Process
- Recently Added
- In Progress
- Open Access
This item is open access.
Organizations today are facing increasing cybersecurity challenges by moving more services to the cloud and outsourcing Intrusion Detection System (IDS) network monitoring tasks to third-party analysts. Zero Trust models may mitigate these challenges by employing the philosophy of “Never Trust, Always Verify.” However, specific anonymization approaches are required to ensure information integrity while preserving privacy. This paper reviews the existing approaches identified in the literature, compares them, and assesses the privacy-accuracy trade-offs. Plus, we have discussed future research directions and knowledge gaps.
Please use this identifier to cite or link to this item: