Preventing And Mitigating Session Hijacking Using Zero Trust Architecture

Authors

  • Santhoshkumar S SRM Institute of Science and Technology Author
  • Arunarani S SRM Institute of Science and Technology Author

DOI:

https://doi.org/10.64123/mijm.v1.i2.2

Keywords:

session hijacking, Zero Trust Architecture (ZTA), continuous authentication, device trust, micro-segmentation, token binding, risk-based access control

Abstract

Session hijacking remains a critical threat in modern cybersecurity, allowing attackers to impersonate legitimate users by exploiting stolen session tokens. Conventional perimeter-based security frameworks often fail to prevent such attacks due to their reliance on static authentication. This study proposes a Zero Trust Architecture (ZTA) approach to prevent and mitigate session hijacking through continuous authentication, device trust verification, and micro-segmentation. A comprehensive dataset—including real-world attack traces, simulated penetration tests, and ZTA implementation logs—was used to evaluate the system's performance. The core components include risk-based access control, short-lived device-bound tokens, and behavioral analytics. Results demonstrate that the proposed model effectively blocks invalid or replayed tokens and untrusted devices, achieving a 100% detection rate in simulated hijacking scenarios. Compared to traditional methods, ZTA significantly reduces the session attack surface and improves resistance against MITM attacks. While challenges remain in user experience and legacy system compatibility, the security benefits justify implementation in cloud and hybrid enterprise environments. It is recommended that organizations adopt ZTA as a foundational security strategy to counter evolving session-based threats.

Downloads

Published

2025-11-30

Issue

Section

Articles

How to Cite

Preventing And Mitigating Session Hijacking Using Zero Trust Architecture. (2025). Multicore International Journal of Multidisciplinary (MIJM), 1(2), 59-66. https://doi.org/10.64123/mijm.v1.i2.2