Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A State-of-the-art Review

Alevizos, L, Thong Ta, V and Hashem Eiza, M (2021) Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A State-of-the-art Review. Security and Privacy. ISSN 2475-6725

[img] Text
Augmenting Zero Trust Architecture to Endpoints Using Blockchain - Accepted.pdf - Accepted Version
Restricted to Repository staff only until 1 November 2022.

Download (1MB)

Abstract

With the purpose of defending against lateral movement in today’s borderless networks, Zero Trust Architecture (ZTA) adoption is gaining momentum. With a full scale ZTA implementation, it is unlikely that adversaries will be able to spread through the network starting from a compromised endpoint. However, the already authenticated and authorised session of a compromised endpoint can be leveraged to perform limited, though malicious, activities ultimately rendering the endpoints the Achilles heel of ZTA. To effectively detect such attacks, distributed collaborative intrusion detection systems with an attack scenario-based approach have been developed. Nonetheless, Advanced Persistent Threats (APTs) have demonstrated their ability to bypass this approach with a high success ratio. As a result, adversaries can pass undetected or potentially alter the detection logging mechanisms to achieve a stealthy presence. Recently, blockchain technology has demonstrated solid use cases in the cyber security domain. In this paper, motivated by the convergence of ZTA and blockchain-based intrusion detection and prevention, we examine how ZTA can be augmented onto endpoints. Namely, we perform a state-of-the-art review of ZTA models, real-world architectures with a focus on endpoints, and blockchain-based intrusion detection systems. We discuss the potential of blockchain’s immutability fortifying the detection process and identify open challenges as well as potential solutions and future directions.

Item Type: Article
Additional Information: This is the peer reviewed version of the following article: Alevizos, L, Ta, VT, Hashem Eiza, M. Augmenting zero trust architecture to endpoints using blockchain: A state-of-the-art review. Security and Privacy. 2021;e191. doi:10.1002/spy2.191 which has been published in final form at https://doi.org/10.1002/spy2.191. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions.
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science & Mathematics
Publisher: Wiley
Date Deposited: 11 Nov 2021 11:54
Last Modified: 11 Nov 2021 12:00
DOI or Identification number: 10.1002/spy2.191
URI: https://researchonline.ljmu.ac.uk/id/eprint/15720

Actions (login required)

View Item View Item