Emerging Cybersecurity Architectures and Methodologies for Modern Threat Landscapes
DOI:
https://doi.org/10.5281/zenodo.14275106Keywords:
Cybersecurity, Zero Trust Architecture (ZTA), Serverless Computing, Enterprise Threat Modeling, Anomaly Detection, Resilient ArchitectureAbstract
The rapid advancement of digital ecosystems, fueled by globalization, cloud migration, and expanding connectivity, demands cybersecurity frameworks capable of countering sophisticated and ever-evolving threats. Traditional perimeter-based security models are increasingly inadequate against the complexity of modern cyberattacks. This paper explores cutting-edge cybersecurity paradigms, including Zero Trust Architecture (ZTA), serverless computing for dynamic network profiling, enterprise-scale threat modeling, and resilient strategies designed for next-generation connectivity. Through this examination, we propose a cohesive approach to creating adaptive, scalable, and resilient cybersecurity systems, offering actionable insights to address the intricate challenges posed by evolving threat landscapes and technological innovations.
References
CrowdStrike, "2024 Global Threat Report," CrowdStrike. [Online]. Available: https://www.crowdstrike.com/global-threat-report/. [Accessed: Nov. 17, 2024].
F. A. Qazi, "Study of Zero Trust Architecture for Applications and Network Security," 2022 IEEE 19th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HO-NET), Marietta, GA, USA, 2022, pp. 111-116, doi: 10.1109/HONET56683.2022.10019186.
N. L. Shete, M. Maddel and Z. Shaikh, "A Comparative Analysis of Cybersecurity Scams: Unveiling the Evolution from Past to Present," 2024 IEEE 9th International Conference for Convergence in Technology (I2CT), Pune, India, 2024, pp. 1-8, doi: 10.1109/I2CT61223.2024.10543498.
H. Y. Ali and W. El-Medany, "IoT security: A review of cybersecurity architecture and layers," 2nd Smart Cities Symposium (SCS 2019), Bahrain, Bahrain, 2019, pp. 1-7, doi: 10.1049/cp.2019.0191.
Scott W. Rose, Oliver Borchert, Stuart Mitchell, Sean Connelly, "Zero Trust Architecture" 2020 NIST, Special Publication (NIST SP) - 800-207.
Check Point Research, "Check Point Research Reports Highest Increase of Global Cyber Attacks Seen in Last Two Years: A 30% Increase in Q2 2024 Global Cyber Attacks," Check Point Research Blog. [Online]. Available: https://blog.checkpoint.com/research/check-point-research-reports-highest-increase-of-global-cyber-attacks-seen-in-last-two-years-a-30-increase-in-q2-2024-global-cyber-attacks/. [Accessed: Nov. 17, 2024].
K. K. Ganeeb, V. Jayaram, M. S. Krishnappa, P. Gupta, A. Nagpal, A. R. Banarse, and S. G. Aarella, "Advanced encryption techniques for securing data transfer in cloud computing: A comparative analysis of classical and quantum-resistant methods," International Journal of Computer Applications, vol. 186, no. 48, pp. 1–9, Nov. 2024. doi: 10.5120/ijca2024924135.
N. Bangad, V. Jayaram, M. S. Krishnappa, A. R. Banarse, D. M. Bidkar, A. Nagpal, and V. Parlapalli, "A Theoretical Framework for AI-Driven Data Quality Monitoring in High-Volume Data Environments", International Journal of Computer Engineering and Technology (IJCET), vol. 15, no. 5, pp. 618–636, Sep.–Oct. 2024. doi: 10.5281/zenodo.13878755.
B. Bokan and J. Santos, "Threat Modeling for Enterprise Cybersecurity Architecture," 2022 Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA, USA, 2022, pp. 25-30, doi: 10.1109/SIEDS55548.2022.9799322.
F. R. Alzaabi and A. Mehmood, "A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods," in IEEE Access, vol. 12, pp. 30907-30927, 2024, doi: 10.1109/ACCESS.2024.3369906.
M. J. Kathiriya, V. Jayaram, M. S. Krishnappa, P. K. Veerapaneni, and A. R. Banarse, "Artificial Intelligence Ancillary Event-Driven Architecture Patterns for Scalable Data Integration on Cloud Computing," IJRAR - International Journal of Research and Analytical Reviews (IJRAR), vol. 11, no. 4, pp. 16-20, Oct. 2024. doi: http://doi.one/10.1729/Journal.41741.
A. Parres-Peredo, I. Piza-Davila and F. Cervantes, "Building and Evaluating User Network Profiles for Cybersecurity Using Serverless Architecture," 2019 42nd International Conference on Telecommunications and Signal Processing (TSP), Budapest, Hungary, 2019, pp. 164-167, doi: 10.1109/TSP.2019.8768825.
J. J. C. Narváez, K. Márceles Villalba and S. A. Donado, "Systematic Review for the Construction of an Architecture With Emerging IoT Technologies, Artificial Intelligence Techniques, Monitoring and Storage of Malicious Traffic," in IEEE Revista Iberoamericana de Tecnologias del Aprendizaje, vol. 17, no. 4, pp. 386-392, Nov. 2022, doi: 10.1109/RITA.2022.3217183.
B. Pothineni, G. Mehta, and S. Suresh, "Comprehensive review of innovations in cloud infrastructure, AI-driven cybersecurity, and advanced IPTV technologies," Journal of Software Engineering (JSE), vol. 2, no. 2, pp. 33–42, 2024. doi: 10.5281/zenodo.14055967.
V. Jayaram, S. R. Sankiti, M. S. Krishnappa, P. K. Veerapaneni, and P. K. Carimireddy, "Accelerated Cloud Infrastructure Development Using Terraform," International Journal of Emerging Technologies and Innovative Research, vol. 11, no. 9, pp. f382-f387, Sep. 2024. doi: 10.5281/zenodo.13935111.
C. V. Guru Rao, N. Mohammad Ali Chisty, S. K. Mishra, M. Sathe, S. Rizvi and M. Soni, "Innovations, Difficulties, and Approaches for Next-Generation Cybersecurity: Protecting the Digital Future," 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies, Pune, India, 2024, pp. 1-6, doi: 10.1109/TQCEBT59414.2024.10545178.
V. Parlapalli, V. Jayaram, S. G. Aarella, K. Peddireddy, and R. R. Palle, "Enhancing Cybersecurity: A Deep Dive into Augmented Intelligence Through Machine Learning and Image Processing," 2023 International Workshop on Artificial Intelligence and Image Processing (IWAIIP), Yogyakarta, Indonesia, 2023, pp. 96-100. doi: 10.1109/IWAIIP58158.2023.10462845.
J. Cano, R. Hernández, S. Ros and L. Tobarra, "A distributed laboratory architecture for game based learning in cybersecurity and critical infrastructures," 2016 13th International Conference on Remote Engineering and Virtual Instrumentation (REV), Madrid, Spain, 2016, pp. 183-185, doi: 10.1109/REV.2016.7444461.
S. Rose, O. Borchert, S. Mitchell, and S. Connelly, Zero Trust Architecture, NIST Special Publication 800-207, National Institute of Standards and Technology, Aug. 2020. [Online]. Available: https://csrc.nist.gov/pubs/sp/800/207/final. doi: 10.6028/NIST.SP.800-207
A. Nagpal, B. Pothineni, A. G. Parthi, D. Maruthavanan, A. R. Banarse, P. K. Veerapaneni, S. R. Sankiti, and V. Jayaram, "Framework for automating compliance verification in CI/CD pipelines," International Journal of Computer Science and Information Technology Research, vol. 5, no. 4, pp. 17–27, 2024. doi: 10.5281/zenodo.14259679.
M. Couto, P. Borba, J. Cunha, J. P. Fernandes, R. Pereira, and J. Saraiva, "Products go green: worst-case energy consumption in software product lines," in Proceedings of the 21st International Systems and Software Product Line Conference, vol. A, 2017, pp. 84–93.
M. Couto, J. Cunha, J. P. Fernandes, R. Pereira, and J. Saraiva, "GreenDroid: A tool for analysing power consumption in the android ecosystem," 2015 IEEE 13th International Scientific Conference on Informatics, Poprad, Slovakia, 2015, pp. 73-78, doi: https://doi.org/10.1109/Informatics.2015.7377811.
I. Zahid, M. A. Ali, and R. Nassr, "Android smartphone: Battery saving service," 2011 International Conference on Research and Innovation in Information Systems, 2011, pp. 1-4.
A. M. Muharum, V. T. Joyejob, V. Hurbungs, and Y. Beeharry, "Enersave API: Android-based power-saving framework for mobile devices," Future Computing and Informatics Journal, vol. 2, no. 1, pp. 48-64, 2017.
A. Almasri and L. B. Gouveia, "Analyzing and Evaluating the Amount of Power Consumption Used by Current Power-Saving-Applications on Android Smartphones," Internal Report TRS 04/2019. Technology, Networks and Society Group, 2019.
N. Zaman and F. A. Almusalli, "Smartphones Power Consumption & Energy Saving Techniques," in 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), 2017, pp. 1-7.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Gaurav Mehta, Vivekananda Jayaram, Durgaraman Maruthavanan, Deepak Jaya-balan, Ashok Gadi Parthi, Darshan Mohan Bidkar, Balakrishna Pothineni, Prema Kumar Veerapaneni (Author)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.