BEYOND THE PERIMETER: ASSESSING THE IMPACT OF ZERO TRUST ARCHITECTURE ON NETWORK LATENCY AND SECURITY RESILIENCE IN LARGE-SCALE ENTERPRISE ENVIRONMENTS

Hadi Mardiyanto (1), Zainal Syahlan (2), Isnadi Isnadi (3)
(1) Sekolah Tinggi Teknologi Angkatan Laut, Indonesia,
(2) Sekolah Tinggi Teknologi Angkatan Laut, Indonesia,
(3) Sekolah Tinggi Teknologi Angkatan Laut, Indonesia

Abstract

Enterprise networks increasingly confront sophisticated cyber threats and complex operational demands, rendering traditional perimeter-based security models inadequate. Zero Trust Architecture (ZTA) has emerged as a paradigm that emphasizes continuous verification, granular access control, and micro-segmentation to enhance security resilience across hybrid and large-scale environments. This study investigates the dual impact of ZTA on network latency and security outcomes, providing empirical insights into performance-security trade-offs.The research aims to evaluate how ZTA implementation affects network latency, throughput, and packet integrity while quantifying improvements in security resilience, including reductions in unauthorized access and lateral threat propagation. Insights from this study are intended to inform enterprise decision-making regarding optimized ZTA deployment. A mixed-methods approach was employed, combining quantitative measurements of latency, throughput, and packet loss across six enterprise networks with qualitative security assessments, including penetration testing and attack simulations. Data were analyzed using statistical techniques and thematic evaluation to identify patterns and interdependencies. Findings indicate that ZTA increases network latency moderately (3–7 ms) and reduces throughput minimally, while significantly enhancing security resilience, with a 70–85% reduction in successful unauthorized access attempts. Correlation analysis reveals a positive trade-off between performance impact and security improvements, emphasizing the importance of configuration optimization. Results confirm that ZTA provides robust protection without critically impairing network performance, offering practical guidance for large-scale enterprise adoption and informing future security-policy strategies.

Full text article

Generated from XML file

References

Akiri, C. K., Jayabalan, K., Lopes, J., Kareem, S. A., & Tabbassum, A. (2025). Generative AI for Real-Time Cloud Security: Advanced Anomaly Detection Using GPT Models. 2025 IEEE Conference on Computer Applications (ICCA), 1–6. https://doi.org/10.1109/ICCA65395.2025.11011269

AlArfaj, L., & AlShuaibi, A. (2025). Critical infrastructure protection. In Q. A. Al-Haija, Y. Maleh, & A. Odeh, Intelligent and Secure Solutions for Digital Transformation (1st ed., pp. 107–130). CRC Press. https://doi.org/10.1201/9781003616511-7

Alluri, K., & Gopikrishnan, S. (2025). Enhancing IoT Security: A Review of Multi-factor Authentication Protocols and Their Effectiveness. In R. C. Poonia, S. Sharma, I. A. Hameed, & K. Upreti (Eds.), Smart Cyber Physical Systems (Vol. 435, pp. 619–630). Springer Nature Singapore. https://doi.org/10.1007/978-981-96-2182-8_46

Benzaïd, C., Guerd, N., El Houda Rehouma, N., Zeraoulia, K., & Taleb, T. (2025). A Multi-Layered Zero Trust Microsegmentation Solution for Cloud-Native 5G & Beyond Networks. 2025 IEEE Wireless Communications and Networking Conference (WCNC), 1–7. https://doi.org/10.1109/WCNC61545.2025.10978671

Cheimonidis, P., & Rantos, K. (2025). A Bayesian–Markov Framework for Proactive and Dynamic Cyber Risk Assessment Driven by EPSS. 2025 IEEE International Conference on Cyber Security and Resilience (CSR), 281–286. https://doi.org/10.1109/CSR64739.2025.11130107

Elmaghbub, A., & Hamdaoui, B. (2024). Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security. IEEE Wireless Communications, 31(2), 42–48. https://doi.org/10.1109/MWC.001.2300420

Germanos, G., Lekidis, A., Brotsis, S., & Kolokotronis, N. (2026). Blockchain architectures for enhancing EV infrastructure security: A unified framework for addressing sophisticated cyber-attacks. Future Generation Computer Systems, 182, 108426. https://doi.org/10.1016/j.future.2026.108426

Goli, G., Shekhawat, P. S., Onapakala, K., Sidhu, K. S., Adudhodla, M., & S, S. (2025). Developments in AI and Cybersecurity Transforming the Evolution of Digital Payments Systems in finances. 2025 World Skills Conference on Universal Data Analytics and Sciences (WorldSUAS), 1–7. https://doi.org/10.1109/WorldSUAS66815.2025.11199062

Jain, S., Ashok, P., & Prabhu, S. (2024). Emerging Technologies for Cybersecurity in Healthcare: Evaluating Risks and Implementing Standards. 2024 International Conference on Cybernation and Computation (CYBERCOM), 725–731. https://doi.org/10.1109/CYBERCOM63683.2024.10803219

Javadnejad, F., Abdelmagid, A. M., Pinto, C. A., Mcshane, M., & Diaz, R. (2024). An exploratory data analysis of malware/ransomware cyberattacks: Insights from an extensive cyber loss dataset. Enterprise Information Systems, 18(9), 2369952. https://doi.org/10.1080/17517575.2024.2369952

Jeong, E., & Yang, D. (2025). A Trust Score-Based Access Control Model for Zero Trust Architecture: Design, Sensitivity Analysis, and Real-World Performance Evaluation. Applied Sciences, 15(17), 9551. https://doi.org/10.3390/app15179551

Joshi, H. (2025). Emerging Technologies Driving Zero Trust Maturity Across Industries. IEEE Open Journal of the Computer Society, 6, 25–36. https://doi.org/10.1109/OJCS.2024.3505056

Julio, Y. R., Viloria-Núñez, C., Sacoto-Cabrera, E. J., Ahumada-Tello, E., Mubarik, M., & Pinto, Á. (2025). AI-RMF-Governed, Zero-Trust Architecture for AI-Enabled IoTaaS: An Industrial Perspective. 2025 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT), 1–6. https://doi.org/10.1109/GCAIoT68269.2025.11275565

Junejo, A. Z., Werthwein, M., & Annighoefer, B. (2025). A Comprehensive Analysis of Cybersecurity Challenges in Self-Adaptive Avionics: A Plug&Fly Avionics Platform Case Study. 2025 IEEE/ACM 20th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 133–139. https://doi.org/10.1109/SEAMS66627.2025.00022

Kaur, J., Sharma, R., & Chaudhary, V. K. (2025). Advanced Data Analytics for Proactive Security. In H. Razavi, M. Ouaissa, M. Ouaissa, H. Nakouri, & A. Abdelgawad, AI-Driven Cybersecurity (1st ed., pp. 92–101). CRC Press. https://doi.org/10.1201/9781003631507-5

Khule, M., Motwani, D., & Chauhan, D. (2025). A layered and integrative framework for Advance Persistent Threat detection and mitigation: Combining AI, Zero-Trust, and Advanced Threat Intelligence. Cluster Computing, 28(11), 740. https://doi.org/10.1007/s10586-025-05561-0

Kumar, R. G., Sambasiva, V., Lakshmi, K. H. R. R. S., Reddy, P. H., Hemanth, R., & Balaji, G. (2026). AI-Enhanced Security: Mastering Multi-Cloud Posture Management. 2026 9th International Conference on Computational Intelligence in Data Science (ICCIDS), 1–6. https://doi.org/10.1109/ICCIDS69108.2026.11407522

Liu, X., Zhou, Y., & Yuen, K. F. (2026). Assessing cybersecurity resilience of digital ports using a BN-FAIR framework. Transportation Research Part D: Transport and Environment, 156, 105379. https://doi.org/10.1016/j.trd.2026.105379

Mehrban, A., El Houda, Z. A., Moudoud, H., Brik, B., & Khoukhi, L. (2025). A Blockchain-Enabled Multi-Layered Zero-Trust Security Framework for O-RAN. 2025 International Wireless Communications and Mobile Computing (IWCMC), 1564–1569. https://doi.org/10.1109/IWCMC65282.2025.11059720

Neupane, S. R., Shrestha, N., & Sun, W. (2026). A Qualitative Synthesis of Cyberattack Trends in Managed Service Providers: Analyzing Multi-Tenant Vulnerabilities and Mitigation Strategies. Information, 17(4), 378. https://doi.org/10.3390/info17040378

Nkrumah, I. P., Sarpong, K. M., & Sowah, R. A. (2026). AI-Powered Intelligent Log Analysis and Zero Trust Frameworks: Revolutionizing Cloud Auditing for Real-Time Anomaly Detection and Compliance Assurance. In G.-N. Nguyen, A. Swaroop, & P. Shukla (Eds.), Proceedings of Fifth International Conference on Computing and Communication Networks (Vol. 1835, pp. 33–46). Springer Nature Switzerland. https://doi.org/10.1007/978-3-032-18211-1_3

Poduvu, S., Neupane, R. L., Esquivel Morel, A., Mitra, R., Anand, V., Chadha, R., & Calyam, P. (2024). Demonstration of Low-overhead Zero Trust at the Tactical Warfighting Edge. MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM), 682–683. https://doi.org/10.1109/MILCOM61039.2024.10773766

Sarela, H. I., & Lebea, K. (2026). Effects of Virtual Private Networks on Data Integrity and Data Encryption. In J. Chaudri, P. N. Mahalle, T. Perumal, & A. Joshi (Eds.), ICT for Intelligent Systems (Vol. 1519, pp. 389–398). Springer Nature Singapore. https://doi.org/10.1007/978-981-96-8901-9_34

Shipman, M. E., Millwater, N., Owens, K., & Smith, S. (2024). A Zero Trust Architecture for Automotive Networks. 2024-01–2793. https://doi.org/10.4271/2024-01-2793

Somayajula, R. (2025). Integrating Big Data Analytics and Devsecops: Adaptive LLM-Based Workflow for Resilient Multi-Cloud Environments. 2025 20th International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP), 1–6. https://doi.org/10.1109/iSAI-NLP66160.2025.11320786

Sulfath, K. K., Ramakrishnan, P. R., Shareef, P. M., & Shanmugam, H. (2025). Enhancing IT Service Management in Indian IT Organizations: A Technological Integration of ISO 20000 with AI, Blockchain, Predictive Analytics, and Zero Trust Security. Indian Journal of Information Sources and Services, 15(1), 267–273. https://doi.org/10.51983/ijiss-2025.IJISS.15.1.34

Zhang, X., He, D., Song, X., Du, H., & Huang, D. (2026). Distributed MPC for Safe and Scalable Consensus of Heterogeneous Multi-Agent Systems in a Zero-Trust Environment. IEEE Transactions on Circuits and Systems I: Regular Papers, 73(2), 1367–1379. https://doi.org/10.1109/TCSI.2025.3590249

Zhang, Y., Lv, P., Hu, J., & Ren, H. (2025). A dynamic network security management method based on the zero-trust concept. In W. Mou (Ed.), International Workshop on Automation, Control, and Communication Engineering (IWACCE 2025) (p. 57). SPIE. https://doi.org/10.1117/12.3091375

Zyoud, B., & Lebai Lutfi, S. (2024). Adapting Zero Trust: Information Security Cultural Factors Considerations in the UAE Context. Asia-Pacific Journal of Information Technology and Multimedia, 13(2), 287–297. https://doi.org/10.17576/apjitm-2024-1302-09

Authors

Hadi Mardiyanto
hadimardiyanto@gmail.com (Primary Contact)
Zainal Syahlan
Isnadi Isnadi
Mardiyanto, H., Syahlan, Z. ., & Isnadi, I. (2026). BEYOND THE PERIMETER: ASSESSING THE IMPACT OF ZERO TRUST ARCHITECTURE ON NETWORK LATENCY AND SECURITY RESILIENCE IN LARGE-SCALE ENTERPRISE ENVIRONMENTS. Journal of Computer Science Advancements, 4(2), 151–163. https://doi.org/10.70177/jsca.v4i2.3859

Article Details