Strengthening ERP Security with AI-Driven Threat Detection and Zero-Trust Principles
DOI:
https://doi.org/10.63282/3050-9246.IJETCSIT-V4I3P116Keywords:
Erp Security, Artificial Intelligence, Zero-Trust Architecture, Threat Detection, Insider Threats, Anomaly Detection, Access Control, CybersecurityAbstract
Enterprise Resource Planning (ERP) systems serve as mission-critical platforms that integrate core organizational functions such as finance, human resources, procurement, and supply chain operations. With the rapid adoption of cloud computing, remote access, and third-party integrations, ERP environments have become increasingly exposed to sophisticated cyber threats, including insider misuse, credential compromise, and advanced persistent attacks. Traditional perimeter-based and rule-driven security mechanisms are no longer sufficient to address these evolving risks. This paper presents a comprehensive ERP security framework that combines AI-driven threat detection with Zero-Trust security principles. Machine learning and deep learning models are employed to analyze user behavior, transaction patterns, and system telemetry in real time, enabling early detection of anomalous and malicious activities. By leveraging behavioral analytics and sequential modeling, the framework enhances detection accuracy while reducing false positives. Zero-Trust principles further strengthen security by enforcing continuous authentication, identity-centric access control, least-privilege enforcement, and micro-segmentation across ERP modules.The proposed approach integrates seamlessly with both modern and legacy ERP platforms through non-intrusive monitoring and external policy enforcement mechanisms. Experimental evaluations and recent industry studies from 2023 demonstrate improved detection accuracy, faster response times, and significant reductions in lateral movement during simulated breaches. The results highlight the effectiveness of combining intelligent analytics with adaptive access control. This work concludes that AI-enabled Zero-Trust architectures are essential for achieving resilient, scalable, and future-ready security in modern ERP systems
Downloads
References
[1] Anderson, J. (2020). AI-Driven Threat Detection in Zero Trust Network Segmentation: Enhancing Cyber Resilience.
[2] Al-Ghofaili, A. A., & Al-Mashari, M. A. (2014, August). ERP system adoption traditional ERP systems vs. cloud-based ERP systems. In Fourth edition of the International Conference on the Innovative Computing Technology (INTECH 2014) (pp. 135-139). IEEE.
[3] She, W., & Thuraisingham, B. (2007). Security for enterprise resource planning systems. Information Systems Security, 16(3), 152-163.
[4] Kamoun, F., Iqbal, F., Esseghir, M. A., & Baker, T. (2020, October). AI and machine learning: A mixed blessing for cybersecurity. In 2020 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-7). IEEE.
[5] Prasad, R., & Rohokale, V. (2019). Artificial intelligence and machine learning in cyber security. In Cyber security: the lifeline of information and communication technology (pp. 231-247). Cham: Springer International Publishing.
[6] Sen, R., Heim, G., & Zhu, Q. (2022). Artificial intelligence and machine learning in cybersecurity: applications, challenges, and opportunities for MIS academics. Communications of the Association for Information Systems, 51(1), 28.
[7] Geluvaraj, B., Satwik, P. M., & Ashok Kumar, T. A. (2018, September). The future of cybersecurity: Major role of artificial intelligence, machine learning, and deep learning in cyberspace. In International Conference on Computer Networks and Communication Technologies: ICCNCT 2018 (pp. 739-747). Singapore: Springer Singapore.
[8] Stafford, V. (2020). Zero trust architecture. NIST special publication, 800(207), 800-207.
[9] Xiong, W., Carlsson, P., & Lagerström, R. (2019, October). Re-using enterprise architecture repositories for agile threat modeling. In 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop (EDOCW) (pp. 118-127). IEEE.
[10] Moral-García, S., Moral-Rubio, S., Fernández, E. B., & Fernández-Medina, E. (2014). Enterprise security pattern: A model-driven architecture instance. Computer Standards & Interfaces, 36(4), 748-758.
[11] Chakravarthy, A., Wiegand, S., Chen, X., Nasser, B., & Surridge, M. (2015). Trustworthy systems design using semantic risk modelling.
[12] Yeboah-Ofori, A., & Islam, S. (2019). Cyber security threat modeling for supply chain organizational environments. Future internet, 11(3), 63.
[13] de Souza, M. E. P. (2021). AI-Driven Network Security for Cloud Systems: Addressing AI Integration Challenges with Multi-Factor Authentication, Multivariate Classification, and Semantic Precedent Retrieval. International Journal of Engineering & Extended Technologies Research (IJEETR), 3(6), 4014-4020.
[14] Dalal, K. R., & Rele, M. (2018, October). Cyber Security: Threat Detection Model based on Machine learning Algorithm. In 2018 3rd International Conference on Communication and Electronics Systems (ICCES) (pp. 239-243). IEEE.
[15] Yuan, S., & Wu, X. (2021). Deep learning for insider threat detection: Review, challenges and opportunities. Computers & Security, 104, 102221.
[16] Shaukat, K., Luo, S., Chen, S., & Liu, D. (2020, October). Cyber threat detection using machine learning techniques: A performance evaluation perspective. In 2020 international conference on cyber warfare and security (ICCWS) (pp. 1-6). IEEE.
[17] Klein, D. (2019). Micro-segmentation: securing complex cloud environments. Network Security, 2019(3), 6-10.
[18] Paul, B., & Rao, M. (2022). Zero-trust model for smart manufacturing industry. Applied Sciences, 13(1), 221.
[19] Inaganti, A. C., Sundaramurthy, S. K., Ravichandran, N., & Muppalaneni, R. (2020). Zero Trust to Intelligent Workflows: Redefining Enterprise Security and Operations with AI. Artificial Intelligence and Machine Learning Review, 1(4), 12-24.
[20] Vysocký, A., Grushko, S., Pastor, R., & Novák, P. (2021, October). Simulation environment for neural network dataset generation. In International Conference on Modelling and Simulation for Autonomous Systems (pp. 322-332). Cham: Springer International Publishing.
[21] Nangi, P. R. (2022). Multi-Cloud Resource Stability Forecasting Using Temporal Fusion Transformers. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 3(3), 123–135. https://doi.org/10.63282/3050-9262.IJAIDSML-V3I3P113
[22] Sundar, D., Jayaram, Y., & Bhat, J. (2022). A Comprehensive Cloud Data Lakehouse Adoption Strategy for Scalable Enterprise Analytics. International Journal of Emerging Research in Engineering and Technology, 3(4), 92–103. https://doi.org/10.63282/3050-922X.IJERET-V3I4P111
[23] Jayaram, Y., & Bhat, J. (2022). Intelligent Forms Automation for Higher Ed: Streamlining Student Onboarding and Administrative Workflows. International Journal of Emerging Trends in Computer Science and Information Technology, 3(4), 100–111. https://doi.org/10.63282/3050-9246.IJETCSIT-V3I4P110
[24] Nangi, P. R., Obannagari, C. K. R. N., & Settipi, S. (2022). Self-Auditing Deep Learning Pipelines for Automated Compliance Validation with Explainability, Traceability, and Regulatory Assurance. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 3(1), 133–142. https://doi.org/10.63282/3050-9262.IJAIDSML-V3I1P114
[25] Sundar, D. (2022). Architectural Advancements for AI/ML-Driven TV Audience Analytics and Intelligent Viewership Characterization. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 3(1), 124–132. https://doi.org/10.63282/3050-9262.IJAIDSML-V3I1P113
[26] Jayaram, Y., & Sundar, D. (2022). Enhanced Predictive Decision Models for Academia and Operations through Advanced Analytical Methodologies. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 3(4), 113–122. https://doi.org/10.63282/3050-9262.IJAIDSML-V3I4P113
[27] Nangi, P. R., Obannagari, C. K. R. N., & Settipi, S. (2022). Enhanced Serverless Micro-Reactivity Model for High-Velocity Event Streams within Scalable Cloud-Native Architectures. International Journal of Emerging Research in Engineering and Technology, 3(3), 127–135. https://doi.org/10.63282/3050-922X.IJERET-V3I3P113
[28] Jayaram, Y., Sundar, D., & Bhat, J. (2022). AI-Driven Content Intelligence in Higher Education: Transforming Institutional Knowledge Management. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 3(2), 132–142. https://doi.org/10.63282/3050-9262.IJAIDSML-V3I2P115
[29] Sundar, D., & Jayaram, Y. (2022). Composable Digital Experience: Unifying ECM, WCM, and DXP through Headless Architecture. International Journal of Emerging Research in Engineering and Technology, 3(1), 127–135. https://doi.org/10.63282/3050-922X.IJERET-V3I1P113
[30] Jayaram, Y., & Sundar, D. (2023). AI-Powered Student Success Ecosystems: Integrating ECM, DXP, and Predictive Analytics. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 4(1), 109–119. https://doi.org/10.63282/3050-9262.IJAIDSML-V4I1P113
[31] Nangi, P. R., Reddy Nala Obannagari, C. K., & Settipi, S. (2022). Predictive SQL Query Tuning Using Sequence Modeling of Query Plans for Performance Optimization. International Journal of AI, BigData, Computational and Management Studies, 3(2), 104–113. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V3I2P111
