IJSRET » August 20, 2025

Daily Archives: August 20, 2025

Uncategorized

Evaluating The Effectiveness Of Zero-Trust Architecture Principles In Reducing Cloud-Based Authentication Threats & Vulnerabilities

Authors: Victor Otieno Mony, Anselemo Peters Ikoha, Roselida O. Maroko

Abstract: The increasing complexity of cyber threats and the widespread adoption of cloud-based services have significantly exposed traditional authentication mechanisms to evolving vulnerabilities. To try and reduce the veracity of these threats, several mitigation mechanisms such as Multifactor and Two Factor Authentication, Biometric Authentication, Key Hashing Protocols, among others, have been employed. However, existing mitigation strategies have proven insufficient in addressing the dynamic nature of CBS authentication threats and vulnerabilities. In response, this paper looks at alternative, better cloud-based authentication mitigation mechanisms through the adoption of Zero Trust Architecture paradigms. The Paper evaluates the five Zero Trust Principles against five cloud-based authentication attack vectors for effectiveness in reducing cloud-based threats and vulnerabilities. The cloud-based authentication-related Zero Trust principles evaluated by this paper are the principles of Least Privilege, Continuous Monitoring, Encryption, Strong Authentication, and Policy Enforcement. The five authentication threat categories whose attack vectors have been used in the evaluation process are Brute Force Attacks, Denial of Service Attacks, Social Engineering Attacks, Man-in-the-Middle Attacks, and Password Discovery Attacks. The evaluation process involves analysing the ZTA principles against the five authentication threats and vulnerabilities attack vectors to determine effectiveness. The results the evaluation indicate that the ZTA principle of Policy Enforcement has the broadest impact across all five threat categories, while the other evaluated Zero Trust principles offer only partial mitigation to cloud-based authentication threats. This is because the Zero Trust principle of Policy Enforcement has a deeper, comprehensive coverage across the selected threat vectors and encompasses a higher number of Zero Trust sub-principles. The paper thus concludes that the Zero Trust principle of policy enforcement is the most suitable foundation for designing a threat-responsive ZTA implementation scheme.

DOI: http://doi.org/10.5281/zenodo.16910750

Published by:
Uncategorized

Advances In Dealing With Long-Term Dependencies: From Vanishing Gradients To Transformer Architectures And Beyond

Authors: Poroni Koiknzi Fousseni, Elvis Thierry Sounna Vofo

Abstract: Long-term dependency modeling remains one of the fundamental challenges in sequence processing tasks across natural language processing, time series analysis, and sequential decision-making. This paper presents a comprehensive analysis of methods for handling long-term dependencies, examining the evolution from traditional recurrent neural networks (RNNs) to modern attention-based architectures. We provide theoretical foundations for the vanishing gradient problem, analyze key architectural innovations including Long Short- Term Memory (LSTM), Gated Recurrent Units (GRU), and Transformer models, and dis- cuss emerging approaches such as State Space Models and Linear Attention mechanisms. Our analysis includes mathematical formulations, computational complexity considerations, and empirical performance comparisons across various sequence modeling tasks. We identify current limitations and propose future research directions for improving long-range sequence modeling capabilities in deep learning systems.

DOI: https://doi.org/10.5281/zenodo.16908505

 

Published by:
× How can I help you?