Abstract
The rise of COVID-19 brought an unprecedented change in the way people lived. It left several people in a work-from-home situation. This Paper aims to investigate the recent works which applied Zero Trust and the reason that this framework adoption has emerged during and after the Pandemic. In this regard, a questionnaire was prepared, and its results are reported. According to its results, with Zero Trust Architecture (ZTA) gaining skyrocket popularity and trust, for around 60% corporates, ZT Access is planned for future, while for around 30% corporates, the project is in pipeline. None of the organizations surveyed have the ZTA in place. 14% of organizations are uninterested in adopting ZTA. Plus, in past 2 years, the percentage of north American organizations having a ZTA on the plans to establish one in the next 12–18 months has shot up.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Lightweight Directory Access Protocol / Active Directory.
References
Lallie, H.S., et al.: Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)
GriffyBrown, C., Lazarikos, D., Chun, M.: How do you secure an environment without a perimeter? Using emerging technology processes to support information security efforts in an agile data center. J. Appl. Bus. Econom. 18(1), 90–102 (2016)
Puthal, D., Mohanty, S.P., Nanda, P., Choppali, U.: Building security perimeters to protect network systems against cyber threats [future directions]. IEEE Consum. Electron. Mag. 6(4), 24–27 (2017)
Assunção, P.: A zero trust approach to network security. In: Proceedings of the Digital Privacy and Security Conference (2019)
Ahmad, T.: Corona virus (COVID-19) pandemic and work from home: challenges of cybercrimes and cybersecurity. SSRN Electron. J. (2020)
Al Hajj, A., Rony, M.: Cyber security in the age of COVID-19: an analysis of cyber-crime and attacks. Int. J. Res. Appl. Sci. Eng. Technol. (IJRASET). 8(VIII), 1476–1480 (2020)
Tama, B.A., Comuzzi, M., Rhee, K.-H.: TSE-IDS: a two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7, 94497–94507 (2019). https://doi.org/10.1109/ACCESS.2019.2928048
Krishnaveni, S., Sivamohan, S., Sridhar, S., Prabhakaran, S.: Network intrusion detection based on ensemble classification and feature selection method for cloud computing. Concurr. Comput. Pract. Exp. 34(11), e6838 (2022). https://doi.org/10.1002/cpe.6838
Tohidi, N., Rustamov, R.B.: Short overview of advanced metaheuristic methods. Int. J. Techn. Phys. Probl. Eng. (IJTPE) 14(51), 84–97 (2022)
Tohidi, N., Rustamov, R.B.: A review of the machine learning in GIS for megacities application. In: Rustamov, R.B. (ed.) Geographic Information Systems in Geospatial Intelligence, pp. 29–53. IntechOpen, London (2020). https://doi.org/10.5772/intechopen.94033
Abolghasemi, M., Dadkhah, C., Tohidi, N.: HTS-DL: hybrid text summarization system using deep learning. In: The 27th International Computer Conference, the Computer Society of Iran, Tehran (2022)
Jiang, K., Wang, W., Wang, A., Wu, H.: Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8, 32464–32476 (2020)
Preethi, D., Khare, N.: Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions. Peer-to-Peer Netw. Appl. 14(4), 2419–2429 (2020). https://doi.org/10.1007/s12083-020-00986-3
Almiani, M., AbuGhazleh, A., AlRahayfeh, A., Atiewi, S., Razaque, A.: Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory 101, 102031 (2020). https://doi.org/10.1016/j.simpat.2019.102031
Lee, I., Kim, D., Lee, S.: 3-D human behavior understanding using generalized TS-LSTM networks. IEEE Trans. Multimed. 23, 415–428 (2020)
AlTuraiki, I., Altwaijry, N.: A convolutional neural network for improved anomaly-based network intrusion detection. Big Data 9(3), 233–252 (2021)
Vinayakumar, R., Soman, K.P., Poornachandran, P.: Applying convolutional neural network for network intrusion detection. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India (2017)
Yin, Y., et al.: IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset. arXiv:2203.16365 (2022)
Cao, B., Li, C., Song, Y., Qin, Y., Chen, C.: Network intrusion detection model based on CNN and GRU. Appl. Sci. 12(9), 4184 (2022). https://doi.org/10.3390/app12094184
Kumar, V., Sinha, D., Das, A.K., Pandey, S.C., Goswami, R.T.: An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset. Clust. Comput. 23(2), 1397–1418 (2019). https://doi.org/10.1007/s10586-019-03008-x
Rose, S., Borchert, O., Mitchell, S., Connelly, S.: Zero trust architecture. In: National Institute of Standards and Technology (NIST) (2020)
Yan, X., Wang, H.: Survey on zero-trust network security. In: International Conference on Artificial Intelligence and Security, Singapore (2020)
Uttecht, K.: Zero Trust (ZT) Concepts for Federal Government Architectures. Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, Massachusets (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Alalmaie, A.Z., Nanda, P., He, X., Alayan, M.S. (2023). Why Zero Trust Framework Adoption has Emerged During and After Covid-19 Pandemic. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2023. Lecture Notes in Networks and Systems, vol 655. Springer, Cham. https://doi.org/10.1007/978-3-031-28694-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-28694-0_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28693-3
Online ISBN: 978-3-031-28694-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)