Articles | Open Access |

Advancing Cybersecurity in Distributed Systems: Integrating Zero Trust Architecture with Intelligent Threat Detection in Microservices and Cyber-Physical Environments

Theresa Butchen , Department of Computer Science, University of Budapest, Hungary

Abstract

The rapid digital transformation of modern organizations has significantly expanded the attack surface of information systems, particularly with the widespread adoption of distributed architectures, Internet of Things ecosystems, and microservices-based applications. Traditional perimeter-based security approaches have proven insufficient for protecting highly interconnected digital infrastructures where trust assumptions can be easily exploited by sophisticated adversaries. As a result, the Zero Trust Architecture (ZTA) paradigm has emerged as a fundamental cybersecurity model that eliminates implicit trust and continuously verifies identities, devices, and services before granting access to resources. This research article presents an extensive theoretical and analytical investigation into the integration of Zero Trust Architecture with intelligent threat detection mechanisms in distributed computing environments.

The study synthesizes insights from contemporary cybersecurity research, focusing particularly on the convergence of ZTA with anomaly detection systems, cyber threat intelligence mining, machine learning-based intrusion detection, and secure microservices architectures. Drawing upon a structured multivocal literature analysis and theoretical modeling approach, the research explores how zero trust principles can enhance security resilience across cloud-native systems, cyber-physical infrastructures, and IoT environments. Particular emphasis is placed on the role of continuous authentication, behavioral analytics, federated learning, and blockchain-enabled trust frameworks in strengthening distributed security mechanisms.

Findings reveal that while Zero Trust Architecture significantly reduces insider threats, lateral movement, and unauthorized data access, its effectiveness depends heavily on the integration of intelligent detection mechanisms capable of analyzing network behaviors and contextual data in real time. The research also highlights emerging innovations such as anomaly-based intrusion detection, artificial intelligence-driven trust evaluation, and decentralized security enforcement frameworks. Additionally, the article explores the security implications of microservices ecosystems, where service-to-service authentication and policy enforcement become critical elements of a zero trust implementation strategy.

The analysis concludes that a hybrid cybersecurity model combining Zero Trust Architecture with adaptive threat intelligence and machine learning techniques offers a promising pathway toward resilient and scalable security frameworks for modern digital infrastructures. The article further identifies significant challenges, including architectural complexity, scalability limitations, policy management difficulties, and operational costs associated with large-scale zero trust deployment. Finally, the research proposes future research directions centered on explainable security analytics, federated cybersecurity intelligence sharing, and the application of large language models for automated security policy generation and incident response support.

Keywords

Zero Trust Architecture, Cybersecurity, Microservices Security, Intrusion Detection

References

Adahman, Z., Malik, A. W., & Anwar, Z. (2022). An analysis of zero-trust architecture and its cost-effectiveness for organizational security. Computers & Security, 122, 102911.

Chandre, P., Mahalle, P., & Shinde, G. (2022). Intrusion prevention system using convolutional neural network for wireless sensor network. IAES International Journal of Artificial Intelligence, 11.

Hajj, S., El Sibai, R., Bou Abdo, J., Demerjian, J., Makhoul, A., & Guyeux, C. (2021). Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets. Transactions on Emerging Telecommunications Technologies, 32.

Hasan, S., Amundson, I., & Hardin, D. (2024). Zero-trust design and assurance patterns for cyber-physical systems. Journal of Systems Architecture, 155.

Hasanov, S., Virtanen, A., Hakkala, A., & Isoaho, J. (2024). Application of large language models in cybersecurity: A systematic literature review. IEEE Access, 12.

Kang, H., Liu, G., Wang, Q., Meng, L., & Liu, J. (2023). Theory and application of zero trust security: A brief survey. Entropy, 25.

Sagar Kesarpu. (2025). Zero-Trust Architecture in Java Microservices. International Journal of Networks and Security, 5(01), 202-214. https://doi.org/10.55640/ijns-05-01-12

Newman, S. (2021). Building Microservices (2nd ed.). O’Reilly Media.

Pokhrel, S. R., Yang, L., Rajasegarar, S., & Li, G. (2024). Robust zero trust architecture: Joint blockchain based federated learning and anomaly detection based framework. Proceedings of the SIGCOMM Workshop on Zero Trust Architecture for Next Generation Communications.

Richardson, C. (2018). Microservices Patterns: With Examples in Java. Manning Publications.

Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero trust architecture. National Institute of Standards and Technology.

Saxena, N., Hayes, E., Bertino, E., Ojo, P., Choo, K. K. R., & Burnap, P. (2020). Impact and key challenges of insider threats on organizations and critical businesses. Electronics, 9.

Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Khan, R. A. (2020). Healthcare data breaches: Insights and implications. Healthcare, 8.

Sun, N., et al. (2023). Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives. IEEE Communications Surveys & Tutorials, 25.

Syed, N. F., Shah, S. W., Shaghaghi, A., Anwar, A., Baig, Z., & Doss, R. (2022). Zero trust architecture: A comprehensive survey. IEEE Access, 10.

Zhou, W., Jia, Y., Yao, Y., Zhu, L., Guan, L., Mao, Y., Liu, P., & Zhang, Y. (2019). Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms. USENIX Security Symposium.

Article Statistics

Copyright License

Download Citations

How to Cite

Theresa Butchen. (2025). Advancing Cybersecurity in Distributed Systems: Integrating Zero Trust Architecture with Intelligent Threat Detection in Microservices and Cyber-Physical Environments . American Journal of Applied Science and Technology, 5(11), 320–331. Retrieved from https://theusajournals.com/index.php/ajast/article/view/9581