AI-Enhanced Zero-Trust Email Migration Framework

Authors

  • Naveen Kumar Siripuram NextEra Energy, USA Author
  • Manish Tomar Citi, USA Author
  • Tanuj Mathur Independent Researcher, USA Author

Keywords:

zero-trust, email migration, anomaly detection, content classification, transformer models

Abstract

The objective of this paper is to presents a secure policy-driven mailbox transition across platforms based on AI-enhanced Zero-Trust Email Migration Framework which is integrated with transformer-based content classification and behavioural anomaly detection. This is achieved by using transformer-based content classification and behavioural anomaly detection. This architecture allows adaptive access controls which is based on authentication anomalies and enforces strict inspection of API call behaviour.

Downloads

Download data is not yet available.

References

N. G. Leveson, "Engineering a safer world: Systems thinking applied to safety," MIT Press, 2011.

P. Mell and T. Grance, "The NIST definition of cloud computing," NIST Special Publication 800-145, Sep. 2011.

J. Kindervag, "Build security into your network's DNA: The Zero Trust Network Architecture," Forrester Research, 2010.

S. M. Bellovin, M. Leech, R. McGrew, and J. Ioannidis, "Network security: A survey," Computer, vol. 38, no. 9, pp. 23-30, Sep. 2005.

D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. CRYPTO 2001, LNCS vol. 2139, pp. 213–229.

R. C. Merkle, "Protocols for public key cryptosystems," in Proc. IEEE Symposium on Security and Privacy, 1980, pp. 122–134.

J. D. Tygar and B. Yee, "Dyad: A system for using partially trusted components," in Proc. 12th USENIX Security Symposium, 2003.

D. D. Clark and D. R. Wilson, "A comparison of commercial and military computer security policies," in Proc. IEEE Symposium on Security and Privacy, 1987.

S. L. Garfinkel and A. Rubin, "Identity theft: Trends and issues," IEEE Security & Privacy, vol. 3, no. 5, pp. 14–21, Sep./Oct. 2005.

Y. Bengio, A. Courville, and P. Vincent, "Representation learning: A review and new perspectives," IEEE Trans. Pattern Anal. Mach. Intell., vol. 35, no. 8, pp. 1798–1828, Aug. 2013.

A. Vaswani et al., "Attention is all you need," arXiv preprint arXiv:1706.03762, 2017.

T. Mikolov, K. Chen, G. Corrado, and J. Dean, "Efficient estimation of word representations in vector space," in Proc. ICLR, 2013.

Y. Kim, "Convolutional neural networks for sentence classification," in Proc. EMNLP, 2014, pp. 1746–1751.

P. K. Chan, M. V. Mahoney, M. H. Arshad, and N. A. Sari, "Learning rules from network data for detecting anomalies," in Proc. AAAI Workshop on AI for Cyber Security, 2003.

F. T. Liu, K. M. Ting, and Z.-H. Zhou, "Isolation forest," in Proc. IEEE ICDM, 2008, pp. 413–422.

L. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proceedings of the IEEE, vol. 77, no. 2, pp. 257–286, 1989.

P. Krishnan and K. M. Radha, "Anomaly detection using clustering techniques in network security," in Proc. IEEE Int. Conf. on Communication and Signal Processing, 2015, pp. 1032–1036.

J. A. Clark and P. C. C. Lee, "Phishing detection through deep packet inspection and machine learning," in Proc. IEEE Int. Conf. on Communications, 2017.

R. Sommer and V. Paxson, "Outside the closed world: On using machine learning for network intrusion detection," in Proc. IEEE Symposium on Security and Privacy, 2010, pp. 305–316.

J. W. Stokes, A. Ghosh, and M. R. Gupta, "Multi-layered approach to phishing detection," in Proc. IEEE Workshop on Information Assurance and Security, 2010.

Downloads

Published

06-08-2018

How to Cite

[1]
Naveen Kumar Siripuram, Manish Tomar, and Tanuj Mathur, “AI-Enhanced Zero-Trust Email Migration Framework”, Art. Intel. Mach. Learn. Auto. Sys., vol. 2, pp. 128–158, Aug. 2018, Accessed: May 23, 2026. [Online]. Available: https://amlas.net/index.php/publication/article/view/22

Similar Articles

11-20 of 43

You may also start an advanced similarity search for this article.