Threat Mitigation in Big Data Ecosystems: Machine Learning-Driven Anomaly Detection for Zero Trust Network Security Architectures
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).06Keywords:
NAAbstract
Big data ecosystems, characterized by massive volume, velocity, and variety of data, present complex and dynamic attack surfaces that traditional perimeter-based security models struggle to defend. The inherent complexity and distributed nature of these environments make them prime targets for sophisticated cyberattacks, including insider threats, data exfiltration, and advanced persistent threats (APTs). The Zero Trust Network Security Architecture (ZTNA) paradigm, operating on the principle of "never trust, always verify," offers a robust framework for securing such environments. However, effectively implementing Zero Trust mandates continuous, granular monitoring and real-time threat assessment across the entire data lifecycle, a challenge compounded by the scale of big data. This paper explores the critical integration of machine learning (ML)-driven anomaly detection as a cornerstone for threat mitigation within Zero Trust big data ecosystems. ML algorithms, trained on vast streams of operational telemetry, network flows, user behavior, and application logs, enable the identification of subtle, evolving deviations from established baselines that signify potential malicious activity. Techniques such as unsupervised learning (e.g., clustering, autoencoders) excel at detecting novel threats without predefined signatures, while supervised and semi-supervised methods enhance detection of known attack patterns and reduce false positives. Deep learning models, including recurrent neural networks (RNNs) and transformers, further improve accuracy by capturing complex temporal dependencies and contextual relationships within high-dimensional big data.
References
Yu, Z., Sun, N., Wu, S., & Wang, Y. (2025, March). Research on Automatic Text Summarization Using Transformer and Pointer-Generator Networks. In 2025 4th International Symposium on Computer Applications and Information Technology (ISCAIT) (pp. 1601-1604). IEEE.
Chen, Rensi. "The application of data mining in data analysis." International Conference on Mathematics, Modeling, and Computer Science (MMCS2022). Vol. 12625. SPIE, 2023.
Lin, Tingting. "Digital Experience Observability in AI-Enhanced Systems: A Framework for Product Managers." ResearchGate, Mar (2025).
Zheng, Haoran, et al. "FinGPT-Agent: An Advanced Framework for Multimodal Research Report Generation with Task-Adaptive Optimization and Hierarchical Attention." (2025).
Xie, Minhui, and Shujian Chen. "Maestro: Multi-Agent Enhanced System for Task Recognition and Optimization in Manufacturing Lines." Authorea Preprints (2025).
Hu, Xiao. "UnrealAdBlend: Immersive 3D Ad Content Creation via Game Engine Pipelines." (2025).
Li, X., Wang, X., & Lin, Y. (2025). Graph Neural Network Enhanced Sequential Recommendation Method for Cross-Platform Ad Campaign. arXiv preprint arXiv:2507.08959.
Wang, Yang, and Zhejun Zhao. "Advancing Abstract Reasoning in Artificial General Intelligence with a Hybrid Multi-Component Architecture." 2024 4th International Symposium on Artificial Intelligence and Intelligent Manufacturing (AIIM). IEEE, 2024.
Lei, Fu, et al. "Teacher-Student Framework for Short-Context Classification with Domain Adaptation and Data Augmentation." (2025).