1 Department of Computer Science, North Carolina State University.
2 Department of Computer Science, Columbia University.
International Journal of Science and Research Archive, 2025, 14(03), 705-712
Article DOI: 10.30574/ijsra.2025.14.3.0645
Received on 28 January 2025; revised on 10 March 2025; accepted on 12 March 2025
Zero Trust Security Architectures (ZTSA) represent a paradigm shift in cybersecurity by eliminating implicit trust and enforcing continuous verification. In this paper, we introduce an AI-driven adaptive authentication framework that leverages real-time risk assessment through advanced mathematical modeling and machine learning techniques. Our framework integrates multiple data sources—including user behavior, device integrity, and external threat intelligence—to dynamically adjust authentication protocols. We provide a rigorous mathematical formulation, detailed experimental analysis, algorithm pseudocode, and discussions on ethical, regulatory, and deployment challenges. Extensive ablation studies and sensitivity analysis are included to compare our approach with baseline systems and to understand the impact of key parameters. Additionally, we include scientific plots such as an ROC curve and a calibration plot to further evaluate model performance.
Zero Trust; Adaptive Authentication; Artificial Intelligence; Cybersecurity; Machine Learning; Risk Assessment; ROC Curve; Calibration Plot
Preview Article PDF
Hitarth Shah and Mahak Shah. AI-driven adaptive authentication for zero trust security architectures. International Journal of Science and Research Archive, 2025, 14(03), 705-712. Article DOI: https://doi.org/10.30574/ijsra.2025.14.3.0645.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0







