Artificial Intelligence-Assisted Identity and Access Management

##plugins.pubIds.doi.readerDisplayName## https://doi.org/10.70593/978-93-49307-51-3

Authors

Esther Chinwe Eze
University of North Texas, United States

Keywords:

Identity and Access Management, Machine Learning, Attack Detection, Cybersecurity, Access Control Systems, Artificial Intelligence, Brute Force Attacks

Synopsis

As businesses come to appreciate the need for Identity and Access Management (IAM) to protect their environments, they ensure that only permitted users can access sensitive data and systems. Growing companies need robust IAM solutions that enable them to handle user authentication, permissions, and access control more effectively, therefore underlining their need. Still, security breaches have been a major headache, even with the advances in IAM technologies. Cybercriminals are constantly improving their techniques to bypass conventional IAM policies, which has resulted in many security incidents and data breaches. Dealing with these security issues offers a promising solution by integrating Artificial Intelligence (AI) and Machine Learning (ML). By helping IAM systems recognize possible attacks that traditional methods could miss, AI and ML technologies provide sophisticated features for spotting unusual behavior patterns. Once an IAM attack is underway, these tools may help better identify unauthorized access, privilege escalation, and other suspect behavior. Machine learning algorithms are particularly well suited for this task as they can constantly learn and adjust from information, enhancing their precision over time. This study investigates the use of ML algorithms to improve the security of IAM systems, concentrating mainly on identifying attacks aimed at IAM servers, including OpenIAM and WSO2. Using Python code and WEKA, the study applies and experiments with different machine learning approaches, such as classification algorithms that can discern atypical behavioral patterns that point to IAM assaults. The research seeks to raise the detection rate of these assaults using machine learning, therefore giving another level of security for IAM systems. The study measures the performance of the suggested solution and its ability to spot possible risks using thorough dataset development, training, and validation of the models. The results of this study underline how combining IAM systems with machine learning could provide more reactive, real-time protection from emerging threats. Although challenges, including data constraints and the difficulty of feature selection, still exist, the findings indicate that artificial intelligence and machine learning might greatly strengthen the resilience of IAM systems. Further investigation could refine the models for even higher precision and broaden their use to other security situations, thereby adding to the larger field of cybersecurity.

Downloads

Published

February 16, 2025

Categories

Details about the available publication format: E-Book

E-Book

ISBN-13 (15)

978-93-49307-51-3

Details about the available publication format: Book (Paperback)

Book (Paperback)

ISBN-13 (15)

978-93-49307-70-4

How to Cite

Eze, E. C. . (2025). Artificial Intelligence-Assisted Identity and Access Management. Deep Science Publishing. https://doi.org/10.70593/978-93-49307-51-3