Home
International Journal of Science and Research Archive
International, Peer reviewed, Open access Journal ISSN Approved Journal No. 2582-8185

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • IJSRA CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN Approved Journal || eISSN: 2582-8185 || CODEN: IJSRO2 || Impact Factor 8.2 || Google Scholar and CrossRef Indexed

Peer Reviewed and Referred Journal || Free Certificate of Publication

Research and review articles are invited for publication in March 2026 (Volume 18, Issue 3) Submit manuscript

Enhancing threat detection in Identity and Access Management (IAM) systems

Breadcrumb

  • Home
  • Enhancing threat detection in Identity and Access Management (IAM) systems

Nikhil Ghadge *

Software Architect Okta.Inc, Software Engineering, Dublin, CA, USA.

Review Article
 
International Journal of Science and Research Archive, 2024, 11(02), 2050–2057.
Article DOI: 10.30574/ijsra.2024.11.2.0761
DOI url: https://doi.org/10.30574/ijsra.2024.11.2.0761

Received on 16 March 2024; revised on 27 April 2024; accepted on 29 April 2024

Identity and Access Management (IAM) systems play a pivotal role in safeguarding organizational resources by controlling access to sensitive information. However, these systems face evolving threats that can compromise security and privacy. This paper proposes a comprehensive approach to enhance threat detection within IAM systems. By integrating advanced techniques such as anomaly detection, machine learning, and behavior analysis, organizations can better identify and respond to suspicious activities. This paper discusses the challenges associated with threat detection in IAM systems and presents practical solutions to mitigate these risks. Furthermore, the paper highlights the importance of continuous monitoring and adaptation effectively combat emerging threats.

Identity and Access Management; Security; Threat detection; Identity theft; Artificial Intelligence; Machine Learning

https://ijsra.net/sites/default/files/fulltext_pdf/IJSRA-2024-0761.pdf

Preview Article PDF

Nikhil Ghadge. Enhancing threat detection in Identity and Access Management (IAM) systems. International Journal of Science and Research Archive, 2024, 11(02), 2050–2057. Article DOI: https://doi.org/10.30574/ijsra.2024.11.2.0761

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

          

   

Copyright © 2026 International Journal of Science and Research Archive - All rights reserved

Developed & Designed by VS Infosolution