|
Literature | Implementation | Advantage | Disadvantage |
|
Kindervag [4] | Extract network data to the management center using DAN | Inspect and analyze data in real time | Network complexity increases and user communication delay increases |
DeCusatis et al. [5] | Using steganography and overwriting methods, the authentication token is embedded in the TCP request packet and the authentication header | Increased security for businesses in cloud computing environments and prevents unwanted fingerprinting of protected resources | No protection at layer 7, not comprehensive enough |
Rose et al. [6] | Automatically link new APIs to existing service mesh categories by using machine learning-based smart association models | Simplify the creation, management, and monitoring of APIs | Difficult to achieve in real environment |
Sultana et al. [7] | The system combines zero trust with blockchain, the blockchain is used to protect sensitive information, and zero trust realizes comprehensive protection of medical data | Combining blockchain with zero trust | Low efficiency |
Weever et al. [8] | A zero trust network security model in a containerized environment | Reduced data leakage in containerized environments | Behavioral analysis and data leak detection are not implemented |
Ramezanpour and Jagannath [9] | Using artificial intelligence for intelligent detection, assessment, and decision-making | Improve the efficiency of ZTA components in processing big data | Only at the theoretical level |
Tian et al. [10] | Zero trust approach based on BLP and BIBA models | Set different weights based on confidentiality and integrity requirements | The weight distribution is not reasonable enough |
Ghate et al. [11] | Automate fine-grained access control with generalized attribute relation extraction | Low cost | Failed to measure performance in a real environment |
|