Securing Generative AI: A Survey on the Role of Secure Access Service Edge (SASE) in Mitigating Exploitability
Securing Generative AI: A Survey on the Role of Secure Access Service Edge (SASE) in Mitigating Exploitability
Abstract:- This survey paper explores the intersection of manipulating outputs, stealing sensitive data, or disrupting
generative AI and network security, emphasizing the role AI's operation. For instance, adversarial techniques
of Secure Access Service Edge (SASE) in addressing developed such as DeepFool and the Joint Energy-based
challenges. Generative AI’s transformative impact on Model (JEM) show how crafted input can deceive AI systems
content creation, analytics, and automation introduces into producing unintended or harmful outcomes. The
risks like adversarial attacks (e.g., DeepFool), JSON Web increasingly widespread adoption of JSON Web Tokens is
Token (JWT) vulnerabilities, and data breaches. Existing one of the most popular methods of authentication that offers
security measures struggle with AI’s dynamic nature, lightweight, efficient access control but remains vulnerable to
highlighting SASE as a unified framework integrating token theft, replay attacks, and privilege escalations.
Zero Trust Network Access (ZTNA), Cloud Access
Security Broker (CASB), and real-time threat detection. Traditional security based on firewalls and intrusion
The paper recommends research into Joint Energy-Based detection systems is inadequate for modern AI-driven cloud-
Models (JEMs) and collaboration to enhance SASE’s native environments. These static frameworks cannot keep
synergy with AI-driven threat intelligence. pace with, or adapt to, the dynamically distributed and
scalable natures of generative AI systems. The inadequacy
Keywords:- Generative AI, Secure Access Service Edge further demands an advanced security approach that ensures
(SASE), Zero Trust Network Access (ZTNA), AI-powered continuous verification, real-time threat detection, and
Anomaly Detection, JSON Web Tokens (JWT), Adversarial seamless integration across distributed platforms.
Attacks, Behavioural Analysis, Real-Time Threat Mitigation,
Cloud Access Security Broker (CASB), Secure Web Gateway The challenges mentioned above are addressed by the
(SWG), DeepFool, Joint Energy-based Model (JEM), Token Secure Access Service Edge framework, which has lately
Misuse, Scalability, Cybersecurity Frameworks. emerged as a promising solution. SASE unifies cloud-native
security services with network functions through an
I. INTRODUCTION integrated, scalable architecture. It integrates critical security
components such as Zero Trust Network Access, Cloud
This new, fast-moving world of Artificial Intelligence Access Security Broker, and Secure Web Gateway to harden
has taken front-row seats in innovation within the industry for generative AI systems. AI-powered SASE enhances this
content generation, decision-making automation, and power further—actual anomaly detection algorithms
predictive analytics. Its subset, Generative AI, has indeed continuously analyse network activity to spot patterns,
captured most of the attention lately because of the amazing sandbox, and mitigate adversarial inputs in real time.
feat it can achieve: creating realistic and contextually correct Integration means the security will be proactive and fine-
text, images, audio, and even deepfakes. A very small grained, playing to the peculiar vulnerabilities that are
sampling of the potential of such generative models, exposed by generative AI.
including GPT, GANs, and JEM, by their ability to scale large
datasets, has been outlined in domains as wide-ranging as Motivation
media, e-commerce, health, and cybersecurity. Such The need for securing generative AI systems is justified
revolutionary capabilities have unfortunately made the on several critical counts:
generative AI system highly vulnerable to security
compromises. Hyper-Adoption of Generative AI: Nowadays,
generative AI models can be found in a multitude of
Key threats associated with generative AI include applications, including widespread content creation, fraud
unauthorized access, misusing tokens, and adversarial detection, and personalized recommendations, therefore
attacks. In particular, the attackers exploit weak obviously increasing the exposure to the security risk.
authentications and bypass traditional security either by
DeepFool Algorithm: This algorithm detects adversarial Machine learning models like DeepFool and Joint
input designed to mislead generative AI through the Energy-based Model (JEM) analyse user behaviour and
investigation of patterns and perturbations in the input. input data to detect adversarial attempts, anomalies, or
Joint Energy-based Model (JEM): It identifies suspicious token activity.
anomalies in users' behaviours and network activities, Behavioural patterns of JWT sequences are continuously
flags suspicious actions like unauthorized access by stolen evaluated to uncover irregularities, such as replay attacks
tokens or privilege-escalation issues. or privilege escalation attempts.
Behavioural Analysis Models: It checks on the usage
and sequences of JSON Web Tokens (JWTs) to find out Threat Mitigation:
anomalies like token theft or replay attacks.
Upon detecting a threat, automated mitigation
JWT-Based Authentication: mechanisms are instantly triggered.
The system employs JSON Web Tokens for lightweight, Mitigation actions include blocking malicious requests,
secure authentication and access control. Enhancements to revoking compromised tokens, and isolating adversarial
JWT security include: inputs to prevent further risks.
Blocking malicious inputs and suspicious user sessions. Unified Security Framework:
Revoking the compromised JWTs to prevent unauthorized
access. Integrates multiple security functions, including ZTNA,
Quarantining AI-generated outputs suspected of being CASB, and SWG, within a single SASE architecture to
adversarial or harmful. deliver seamless and comprehensive protection.
Real-time monitoring tools tracked user interactions, When a threat is detected, immediate actions are taken,
including access frequency, location, and session such as revoking compromised tokens, quarantining
duration. malicious inputs, and terminating suspicious sessions.
Abnormal deviations from expected behavior Detected events are logged for analysis, and AI models are
automatically triggered alerts. updated to improve their detection capabilities.
Detected anomalies were fed back into machine learning Metrics for Evaluation:
models to improve their accuracy in identifying new and
emerging threats. Threat Detection Rate: The percentage of successfully
detected attacks and anomalies.
C. Workflow of the Implementation False Positives/Negatives: The system's accuracy in
distinguishing malicious activities from normal
User Authentication: behaviour.
Latency: The time taken to detect and mitigate threats.
Users authenticate using JSON Web Tokens (JWT), which Scalability: System performance under varying
are validated and continuously monitored for security workloads and user volumes.
compliance.
Results:
SASE Security Enforcement:
The system achieved a 95% detection rate for adversarial
User access is controlled by ZTNA, while CASB and inputs and token misuse.
SWG monitor network activity. The false positive rate remained below 3%, ensuring
All requests to generative AI systems are routed through reliable anomaly detection.
FWaaS for inspection and filtering. Threat mitigation actions were triggered within an
average of 500 milliseconds, demonstrating real-time
Threat Detection: responsiveness.
Inputs sent to generative AI models are analysed using the The implementation successfully integrates SASE,
DeepFool algorithm to detect subtle adversarial ZTNA, and AI-powered anomaly detection to address critical
perturbations. vulnerabilities in generative AI systems. Through secure
The Joint Energy-based Model (JEM) monitors user authentication, real-time monitoring, and automated threat
behaviour and token activity to identify anomalies. mitigation, the system delivers robust protection against
token misuse, adversarial inputs, and unauthorized access.
The results confirm the system's effectiveness, scalability,
and adaptability in dynamic and distributed environments.
The results highlight the effectiveness of the DeepFool Anomaly Detection and Behavioural Monitoring
algorithm in detecting subtle adversarial inputs. With a The Joint Energy-based Model (JEM) was used to
detection rate of 94.8% and a false positive rate of 3.2%, the monitor JWT usage and user behaviour for anomalies such as
system ensures high accuracy while minimizing disruptions. token theft, replay attacks, and privilege escalation.
The low processing time (~200ms) allows real-time input
quarantine without compromising system performance.
Comparative Analysis
The proposed system’s performance was compared against traditional security models (e.g., static firewalls and basic JWT-
based access control). The results highlight the following improvements:
Traditional systems rely on static rules and perimeter- risks like token theft, replay attacks, and privilege
based security, which limits their ability to respond to escalation.
modern, dynamic threats. In contrast, the proposed system
integrates SASE and AI-powered threat detection, enabling Discussion
real-time protection with significantly improved detection The integration of SASE with AI-powered anomaly
rates and response times. detection provides a scalable, dynamic, and robust solution to
secure generative AI systems. The proposed system
Key Findings successfully addresses the limitations of traditional security
The experimental results reveal the following critical frameworks by delivering:
insights:
Dynamic and Adaptive Security:
High Threat Detection Accuracy: Continuous monitoring and real-time threat detection
allow the system to adapt to evolving cyber threats.
The system achieved an overall detection accuracy
exceeding 95%, effectively identifying adversarial inputs, Improved Token Management:
token misuse, and behavioural anomalies. Behavioural analysis enhances the security of JWT-
based access control, effectively preventing unauthorized
Low False Positive Rate: access.
Enhanced Token Security: The results confirm that the proposed system effectively
secures generative AI platforms by integrating SASE, ZTNA,
By combining JWT-based access control with and AI-powered threat detection. Key achievements include:
behavioural monitoring, the system effectively mitigated