The Erosion of Cybersecurity Zero-Trust Principles Through Generative AI: A Survey on the Challenges and Future Directions

dc.citation.issue4
dc.citation.volume5
dc.contributor.authorXu D
dc.contributor.authorGondal I
dc.contributor.authorYi X
dc.contributor.authorSusnjak T
dc.contributor.authorWatters P
dc.contributor.authorMcIntosh TR
dc.date.accessioned2026-01-05T20:33:49Z
dc.date.issued2025-12-01
dc.description.abstractGenerative artificial intelligence (AI) and persistent empirical gaps are reshaping the cyber threat landscape faster than Zero-Trust Architecture (ZTA) research can respond. We reviewed 10 recent ZTA surveys and 136 primary studies (2022–2024) and found that 98% provided only partial or no real-world validation, leaving several core controls largely untested. Our critique, therefore, proceeds on two axes: first, mainstream ZTA research is empirically under-powered and operationally unproven; second, generative-AI attacks exploit these very weaknesses, accelerating policy bypass and detection failure. To expose this compounding risk, we contribute the Cyber Fraud Kill Chain (CFKC), a seven-stage attacker model (target identification, preparation, engagement, deception, execution, monetization, and cover-up) that maps specific generative techniques to NIST SP 800-207 components they erode. The CFKC highlights how synthetic identities, context manipulation and adversarial telemetry drive up false-negative rates, extend dwell time, and sidestep audit trails, thereby undermining the Zero-Trust principles of verify explicitly and assume breach. Existing guidance offers no systematic countermeasures for AI-scaled attacks, and that compliance regimes struggle to audit content that AI can mutate on demand. Finally, we outline research directions for adaptive, evidence-driven ZTA, and we argue that incremental extensions of current ZTA that are insufficient; only a generative-AI-aware redesign will sustain defensive parity in the coming threat cycle.
dc.description.confidentialfalse
dc.edition.editionDecember 2025
dc.identifier.citationXu D, Gondal I, Yi X, Susnjak T, Watters P, McIntosh TR. (2025). The Erosion of Cybersecurity Zero-Trust Principles Through Generative AI: A Survey on the Challenges and Future Directions. Journal of Cybersecurity and Privacy. 5. 4.
dc.identifier.doi10.3390/jcp5040087
dc.identifier.eissn2624-800X
dc.identifier.elements-typejournal-article
dc.identifier.number87
dc.identifier.urihttps://mro.massey.ac.nz/handle/10179/73973
dc.languageEnglish
dc.publisherMDPI (Basel, Switzerland)
dc.publisher.urihttps://www.mdpi.com/2624-800X/5/4/87
dc.relation.isPartOfJournal of Cybersecurity and Privacy
dc.rightsCC BY
dc.rights(c) 2025 The Author/s
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.subjectzero trust
dc.subjectgenerative AI
dc.subjectcybersecurity
dc.subjectadversarial attacks
dc.subjecttrust mechanisms
dc.subjectAI auditing
dc.titleThe Erosion of Cybersecurity Zero-Trust Principles Through Generative AI: A Survey on the Challenges and Future Directions
dc.typeJournal article
pubs.elements-id608944
pubs.organisational-groupOther

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
608944 PDF.pdf
Size:
575.27 KB
Format:
Adobe Portable Document Format
Description:
Evidence

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
9.22 KB
Format:
Plain Text
Description:

Collections