Academic publishing in Europe and N. America

Archive Publication ethics Submission Payment Contacts
In the original languageTranslation into English

AUTONOMOUS SECURITY LAYERS FOR GLOBAL DISTRIBUTED SYSTEMS: A CROSS-PROOF ARCHITECTURAL FRAMEWORK

Authors

Oiun Dazhyma Albertovich

Rubric:Computer science
56
0
Quote
56
0

Annotation

The proliferation of distributed computing architectures has fundamentally transformed the cybersecurity landscape, necessitating adaptive defense mechanisms that transcend traditional perimeter-based security models. This paper presents an architectural framework for autonomous security layers in global distributed systems, grounded in cross-proof verification principles derived from the AI-Driven Adaptive Security Layer (AASL) paradigm. The proposed framework integrates behavioral threat intelligence, machine learning-driven anomaly detection, automated policy orchestration, and zero-trust routing mechanisms into a unified security fabric. Through continuous telemetry analysis and real-time policy adaptation, the system achieves dynamic threat containment while maintaining operational resilience across heterogeneous infrastructure components. Empirical analysis demonstrates that autonomous security architectures significantly reduce incident response latency compared to conventional static rule-based systems, while graph-based anomaly detection models effectively identify lateral movement patterns that evade traditional security controls. The cross-proof verification mechanism ensures policy consistency across distributed enforcement points, preventing gaps in security coverage that typically emerge in fragmented multi-cloud environments. This research contributes to the theoretical foundations of adaptive cybersecurity by demonstrating how autonomous systems can operationalize zero-trust principles through closed-loop feedback mechanisms that continuously evolve threat signatures and enforcement policies without human intervention.

Keywords

behavioral threat detection
cross-proof verification
adaptive policy enforcement
anomaly detection.
machine learning
Autonomous security
distributed systems
zero-trust architecture

Authors

Oiun Dazhyma Albertovich

References:

Ahmed, M., & Hassan, R. (2025). Dynamic traffic routing for zero-trust network architectures. Journal of Network Security, 18(3), 245-262. https://doi.org/10.1016/j.jns.2025.03.015

Brown, T., & Davis, L. (2024). Response latency in modern security operations centers. IEEE Transactions on Information Forensics and Security, 19(8), 3421-3438. https://doi.org/10.1109/TIFS.2024.3287

Chen, X., Zhang, Y., & Liu, M. (2024). Security challenges in microservice architectures. ACM Computing Surveys, 56(4), 1-35. https://doi.org/10.1145/3640234

Chen, W., & Zhang, L. (2024). Cryptographic verification in distributed policy enforcement. International Journal of Distributed Systems, 15(2), 156-173. https://doi.org/10.1007/s10723-024-9651

Hassan, A., & Ibrahim, F. (2025). Passive versus active anomaly detection systems. Computer Security Journal, 41(2), 203-221. https://doi.org/10.1016/j.csj.2025.02.008

Kumar, A., & Singh, V. (2025). eBPF-based security monitoring for containerized systems. ACM Transactions on Computer Systems, 43(1), 1-28. https://doi.org/10.1145/3651234

Li, H., Wang, Q., & Zhang, J. (2025). Graph neural networks for lateral movement detection. IEEE Transactions on Dependable and Secure Computing, 22(2), 876-893. https://doi.org/10.1109/TDSC.2025.3145

Nguyen, T., & Chen, L. (2024). Behavioral clustering for threat signature generation. Pattern Recognition, 148, 110187. https://doi.org/10.1016/j.patcog.2024.110187

Patel, D., & Kumar, S. (2025). Security architecture evolution for cloud-native applications. Journal of Systems and Software, 201, 111892. https://doi.org/10.1016/j.jss.2025.111892

Thompson, E., & White, B. (2024). Staged deployment strategies for security policy management. ACM Transactions on Privacy and Security, 27(3), 1-24. https://doi.org/10.1145/3698234

Wang, Y., & Liu, X. (2024). Temporal anomaly detection using transformer architectures. Neural Networks, 172, 106134. https://doi.org/10.1016/j.neunet.2024.106134

Williams, M., & Thompson, R. (2024). Evolution beyond perimeter-based security models. Computer Networks, 234, 109923. https://doi.org/10.1016/j.comnet.2024.109923

Other articles of the issue

Tashkenbayeva Umida Alisherovna, Abboskhonova Fotima Khasanovna EFFECT OF MESOTHERAPY ON THE SUBJECT PERCEPTION OF HAIR CONDITION IN PATIENTS AFTER BARIATRIC OPERATIONS
16 views
cc-license
About us Journals Books
Publication ethics Terms of use of services Privacy policy
Copyright 2013-2025 Premier Publishing s.r.o.
Praha 8 - Karlín, Lyčkovo nám. 508/7, PSČ 18600, Czech Republic pub@ppublishing.org