Skip to main content

Why Zero Trust Framework Adoption has Emerged During and After Covid-19 Pandemic

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 655))

Abstract

The rise of COVID-19 brought an unprecedented change in the way people lived. It left several people in a work-from-home situation. This Paper aims to investigate the recent works which applied Zero Trust and the reason that this framework adoption has emerged during and after the Pandemic. In this regard, a questionnaire was prepared, and its results are reported. According to its results, with Zero Trust Architecture (ZTA) gaining skyrocket popularity and trust, for around 60% corporates, ZT Access is planned for future, while for around 30% corporates, the project is in pipeline. None of the organizations surveyed have the ZTA in place. 14% of organizations are uninterested in adopting ZTA. Plus, in past 2 years, the percentage of north American organizations having a ZTA on the plans to establish one in the next 12–18 months has shot up.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Lightweight Directory Access Protocol / Active Directory.

References

  1. Lallie, H.S., et al.: Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)

    Google Scholar 

  2. GriffyBrown, C., Lazarikos, D., Chun, M.: How do you secure an environment without a perimeter? Using emerging technology processes to support information security efforts in an agile data center. J. Appl. Bus. Econom. 18(1), 90–102 (2016)

    Google Scholar 

  3. Puthal, D., Mohanty, S.P., Nanda, P., Choppali, U.: Building security perimeters to protect network systems against cyber threats [future directions]. IEEE Consum. Electron. Mag. 6(4), 24–27 (2017)

    Article  Google Scholar 

  4. Assunção, P.: A zero trust approach to network security. In: Proceedings of the Digital Privacy and Security Conference (2019)

    Google Scholar 

  5. Ahmad, T.: Corona virus (COVID-19) pandemic and work from home: challenges of cybercrimes and cybersecurity. SSRN Electron. J. (2020)

    Google Scholar 

  6. Al Hajj, A., Rony, M.: Cyber security in the age of COVID-19: an analysis of cyber-crime and attacks. Int. J. Res. Appl. Sci. Eng. Technol. (IJRASET). 8(VIII), 1476–1480 (2020)

    Google Scholar 

  7. Tama, B.A., Comuzzi, M., Rhee, K.-H.: TSE-IDS: a two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7, 94497–94507 (2019). https://doi.org/10.1109/ACCESS.2019.2928048

    Article  Google Scholar 

  8. Krishnaveni, S., Sivamohan, S., Sridhar, S., Prabhakaran, S.: Network intrusion detection based on ensemble classification and feature selection method for cloud computing. Concurr. Comput. Pract. Exp. 34(11), e6838 (2022). https://doi.org/10.1002/cpe.6838

    Article  Google Scholar 

  9. Tohidi, N., Rustamov, R.B.: Short overview of advanced metaheuristic methods. Int. J. Techn. Phys. Probl. Eng. (IJTPE) 14(51), 84–97 (2022)

    Google Scholar 

  10. Tohidi, N., Rustamov, R.B.: A review of the machine learning in GIS for megacities application. In: Rustamov, R.B. (ed.) Geographic Information Systems in Geospatial Intelligence, pp. 29–53. IntechOpen, London (2020). https://doi.org/10.5772/intechopen.94033

    Chapter  Google Scholar 

  11. Abolghasemi, M., Dadkhah, C., Tohidi, N.: HTS-DL: hybrid text summarization system using deep learning. In: The 27th International Computer Conference, the Computer Society of Iran, Tehran (2022)

    Google Scholar 

  12. Jiang, K., Wang, W., Wang, A., Wu, H.: Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8, 32464–32476 (2020)

    Article  Google Scholar 

  13. Preethi, D., Khare, N.: Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions. Peer-to-Peer Netw. Appl. 14(4), 2419–2429 (2020). https://doi.org/10.1007/s12083-020-00986-3

    Article  Google Scholar 

  14. Almiani, M., AbuGhazleh, A., AlRahayfeh, A., Atiewi, S., Razaque, A.: Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory 101, 102031 (2020). https://doi.org/10.1016/j.simpat.2019.102031

    Article  Google Scholar 

  15. Lee, I., Kim, D., Lee, S.: 3-D human behavior understanding using generalized TS-LSTM networks. IEEE Trans. Multimed. 23, 415–428 (2020)

    Article  Google Scholar 

  16. AlTuraiki, I., Altwaijry, N.: A convolutional neural network for improved anomaly-based network intrusion detection. Big Data 9(3), 233–252 (2021)

    Article  Google Scholar 

  17. Vinayakumar, R., Soman, K.P., Poornachandran, P.: Applying convolutional neural network for network intrusion detection. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India (2017)

    Google Scholar 

  18. Yin, Y., et al.: IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset. arXiv:2203.16365 (2022)

  19. Cao, B., Li, C., Song, Y., Qin, Y., Chen, C.: Network intrusion detection model based on CNN and GRU. Appl. Sci. 12(9), 4184 (2022). https://doi.org/10.3390/app12094184

    Article  Google Scholar 

  20. Kumar, V., Sinha, D., Das, A.K., Pandey, S.C., Goswami, R.T.: An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset. Clust. Comput. 23(2), 1397–1418 (2019). https://doi.org/10.1007/s10586-019-03008-x

    Article  Google Scholar 

  21. Rose, S., Borchert, O., Mitchell, S., Connelly, S.: Zero trust architecture. In: National Institute of Standards and Technology (NIST) (2020)

    Google Scholar 

  22. Yan, X., Wang, H.: Survey on zero-trust network security. In: International Conference on Artificial Intelligence and Security, Singapore (2020)

    Google Scholar 

  23. Uttecht, K.: Zero Trust (ZT) Concepts for Federal Government Architectures. Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, Massachusets (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abeer Z. Alalmaie .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alalmaie, A.Z., Nanda, P., He, X., Alayan, M.S. (2023). Why Zero Trust Framework Adoption has Emerged During and After Covid-19 Pandemic. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2023. Lecture Notes in Networks and Systems, vol 655. Springer, Cham. https://doi.org/10.1007/978-3-031-28694-0_17

Download citation

Publish with us

Policies and ethics