Claim Missing Document
Check
Articles

Found 1 Documents
Search

Preventing And Mitigating Session Hijacking Using Zero Trust Architecture Santhoshkumar S; Arunarani S
Multicore International Journal of Multidisciplinary (MIJM) Vol. 1 No. 2 (2025): November
Publisher : Marasofi International Media and Publishing (MIMP)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.64123/mijm.v1.i2.2

Abstract

Session hijacking remains a critical threat in modern cybersecurity, allowing attackers to impersonate legitimate users by exploiting stolen session tokens. Conventional perimeter-based security frameworks often fail to prevent such attacks due to their reliance on static authentication. This study proposes a Zero Trust Architecture (ZTA) approach to prevent and mitigate session hijacking through continuous authentication, device trust verification, and micro-segmentation. A comprehensive dataset—including real-world attack traces, simulated penetration tests, and ZTA implementation logs—was used to evaluate the system's performance. The core components include risk-based access control, short-lived device-bound tokens, and behavioral analytics. Results demonstrate that the proposed model effectively blocks invalid or replayed tokens and untrusted devices, achieving a 100% detection rate in simulated hijacking scenarios. Compared to traditional methods, ZTA significantly reduces the session attack surface and improves resistance against MITM attacks. While challenges remain in user experience and legacy system compatibility, the security benefits justify implementation in cloud and hybrid enterprise environments. It is recommended that organizations adopt ZTA as a foundational security strategy to counter evolving session-based threats.