The Integration of Artificial Intelligence in Secure Access Service Edge: Enhancing Network Security and Performance
DOI:
https://doi.org/10.32628/CSEIT24106191Keywords:
AI-Enhanced SASE, Secure Access Service Edge, Zero Trust Network Security, Privacy-Preserving Threat Detection, Automated Network Optimization, Intelligent Compliance ManagementAbstract
Integrating Artificial Intelligence (AI) with Secure Access Service Edge (SASE) architecture represents a significant advancement in enterprise network security and management. This article examines the transformative impact of AI technologies on SASE implementations, focusing on enhanced threat detection capabilities, dynamic network optimization, and automated compliance management. The article comprehensively analyzes AI-driven security features, including real-time threat detection, zero-trust implementation, and privacy-preserving security measures. Through extensive evaluation of deployment scenarios and performance metrics, our research demonstrates significant improvements in security effectiveness and operational efficiency, including a 90% reduction in threat detection time, a 45% decrease in network latency, and a 65% reduction in manual configuration tasks. The article highlights the system's capability to maintain robust security while preserving data privacy through advanced encrypted traffic analysis techniques. The article addresses current integration challenges and provides insights into successful implementation strategies. This article contributes to the growing body of knowledge on AI-enhanced network security architectures and provides valuable insights for organizations seeking to modernize their security infrastructure while maintaining operational efficiency and compliance with evolving regulatory requirements.
Downloads
References
Zscaler. (2023). " What Is Secure Access Service Edge (SASE)?" Available: https://www.zscaler.com/resources/security-terms-glossary/what-is-sase
Seymour, Nathan Lynn. "Zero Trust Architectures: A Comprehensive Analysis and Implementation Guide." (2023). https://digitalcommons.memphis.edu/etd/3329/
Wang, Bo-Xiang, Jiann-Liang Chen, and Chiao-Lin Yu. "An ai-powered network threat detection system." IEEE Access 10 (2022): 54029-54037. https://ieeexplore.ieee.org/abstract/document/9775989 DOI: https://doi.org/10.1109/ACCESS.2022.3175886
Umoga, Uchenna Joseph, et al. "Exploring the potential of AI-driven optimization in enhancing network performance and efficiency." Magna Scientia Advanced Research and Reviews 10.1 (2024): 368-378. https://magnascientiapub.com/journals/msarr/content/exploring-potential-ai-driven-optimization-enhancing-network-performance-and-efficiency DOI: https://doi.org/10.30574/msarr.2024.10.1.0028
Khinvasara, Tushar, Abhishek Shankar, and Connor Wong. "Survey of Artificial Intelligence for Automated Regulatory Compliance Tracking." Journal of Engineering Research and Reports 26.7 (2024): 390-406. http://eprints.ditdo.in/id/eprint/2261/ DOI: https://doi.org/10.9734/jerr/2024/v26i71217
PaloAlto. (2024). "What Is the Role of AI in Threat Detection?" Available: https://www.paloaltonetworks.com/cyberpedia/ai-in-threat-detection#:~:text=Data%20Handling%20and%20Processing,User%20activity%20records
Tanuwidjaja, Harry Chandra, et al. "Privacy-preserving deep learning on machine learning as a service—a comprehensive survey." IEEE Access 8 (2020): 167425-167447. https://ieeexplore.ieee.org/abstract/document/9194237 DOI: https://doi.org/10.1109/ACCESS.2020.3023084
Palo Alto Networks. (2024). " What Are Managed SASE Services?" Available: https://www.paloaltonetworks.com/cyberpedia/what-are-managed-sase-services#:~:text=When%20choosing%20a%20managed%20SASE,user%20experience%20isn't%20compromised.
Juniper Networks. (2024). " AI-Driven Enterprise for Managed Services" Available: https://www.juniper.net/us/en/the-feed/topics/operations/ai-driven-enterprise-for-managed-services-demo.html
Walt, Stephanus & Venter, Hein. (2022). Research Gaps and Opportunities for Secure Access Service Edge. International Conference on Cyber Warfare and Security. 17. 609-619. 10.34190/iccws.17.1.75. https://papers.academic-conferences.org/index.php/iccws/article/view/75 DOI: https://doi.org/10.34190/iccws.17.1.75
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.