AI-Powered Autonomous Anomaly Detection in IAM: A Quantum-Resistant Deep Learning Framework with Real-Time Adaptive Risk Management and Federated Learning
-
https://doi.org/10.14419/wk6sd964
Received date: November 11, 2025
Accepted date: January 11, 2026
Published date: February 12, 2026
-
Quantum-Resistant Anomaly Detection, Federated Learning, Agentic AI, IAM Systems, Cybersecurity, Privacy-Preserving, Quantum Computing, Anomaly Detection, Model Scalability, Real-time Detection, Post-Quantum Cryptography, Homomorphic Encryption, ICS-Flow Dataset -
Abstract
This study introduces the Quantum-Resistant Federated Anomaly Detection (QRFAD) framework, a novel approach for addressing the challenges of anomaly detection in Identity and Access Management (IAM) systems in the face of evolving cyber threats and emerging quantum computing risks. By combining federated learning, quantum-resistant cryptography, and Agentic AI, QRFAD overcomes the limitations of traditional anomaly detection models, such as LSTM and SVM. The framework ensures a scalable, secure, and privacy-preserving solution that enables multiple organizations to collaboratively train models without sharing sensitive data. Key performance metrics, including precision, recall, F1-score, latency, and scalability, were evaluated on the ICS-Flow dataset, demonstrating that QRFAD significantly outperformed the LSTM and SVM models. Specifically, QRFAD achieved a precision of 0.94, recall of 0.91, and F1-score of 0.92, all higher than the LSTM (0.85, 0.83, 0.84) and SVM models (0.78, 0.75, 0.76). Moreover, QRFAD reduced the latency by 35.71\% (75 ms vs. 120 ms) and improved the model update overhead by 50\% (1.2s vs. 2.5s). This work addresses key gaps in the literature related to scalability, quantum threats, and autonomous decision-making, providing an adaptive and secure IAM solution capable of evolving with emerging cyber threats.
-
References
- . D. Godavarthi, “Federated quantum‑inspired anomaly detection using collaborative neural clients,” emph{Frontiers in Artificial Intelligence}, 2025. Available: url{https://www.frontiersin.org/journals/artificial-intelligence/articles/10.3389/frai.2025.1648609/full}
- . L. H. Lim, “Federated Learning for Anomaly Detection: A Systematic Review,” emph{Information}, vol. 17, no. 8, p. 375, 2025. Available: url{https://www.mdpi.com/1999-5903/17/8/375}
- . R. Ballester, “Quantum federated learning: a comprehensive literature review,” emph{Quantum Machine Intelligence}, 2025. Available: url{https://link.springer.com/article/10.1007/s42484-025-00292-2}
- . S. Aboukadri, “Machine learning in identity and access management: survey,” emph{Computers & Security}, 2024. Available: url{https://www.sciencedirect.com/science/article/abs/pii/S0167404824000300}
- . S. Vitla, “The Future of Identity and Access Management: Leveraging AI for Enhanced Security and Efficiency,” emph{Journal of Cyber Security & Threats Studies}, vol. 4, no. 1, 2024. Available: url{https://al-kindipublishers.org/index.php/jcsts/article/view/8619}
- . P. Cheruku, “Optimizing Identity and Access Management through 1D‑Separable CNNs,” emph{Journal of Applied Pattern Recognition and Intelligent Engineering}, 2024. Available: url{https://www.journal-aprie.com/article_208348_8181657a72d2581e772496709657e737.pdf}
- . S. Ahmed et al., “A Post‑Quantum Secure Federated Learning Framework for Cross Domain Authentication (V2G),” 2025. Available: url{https://repository.essex.ac.uk/41110/1/A_Post_Quantum_Secure_Federated_Learning_Framework_for_Cross_Domain_V2G_Authentication.pdf}
- . M. Rahmati & A. Pagano, “Federated Learning‑Driven Cybersecurity Framework for IoT Networks with Privacy Preserving and Real‑Time Threat Detection Capabilities,” emph{Informatics}, vol. 12, no. 3, 2025, p. 62. Available: url{https://doi.org/10.3390/informatics12030062}
- . S. Ahmed, “Quantum‑driven zero trust architecture with dynamic identity and access management,” 2025. Available: url{https://www.sciencedirect.com/science/article/pii/S3050644125000052}
- . J. Vegas, “Opportunities and Challenges of Artificial Intelligence in IAM Security,” emph{Future Internet}, vol. 16, no. 12, p. 469, 2024. Available: url{https://www.mdpi.com/1999-5903/16/12/469}
- . “AI‑Driven Anomaly Detection for Insider Threat Prevention in Identity and Access Management (IAM) Systems,” 2025. Available: url{https://www.researchgate.net/publication/393784721_AI-Driven_Anomaly_Detection_for_Insider_Threat_Prevention_in_Identity_and_Access_Management_IAM_Systems}
- . “AI for Identity and Access Management (IAM) in the Cloud: Exploring the Potential of Artificial Intelligence to Improve User Authentication, Authorization, and Access Control within Cloud-Based Systems,” 2024. Available: url{https://sdiopr.s3.ap-south-1.amazonaws.com/2024/Jan/27-Jan-24/2024_AJRCOS_112496/Ms_AJRCOS_112496.pdf}
- . J. Kim and Y. Park, “Profile Decomposition of Nonlinear Systems for Cyber Risk Forecasting,” emph{Journal of Network and Computer Applications}, vol. 2023, p. 103619, 2023. Available: url{https://www.sciencedirect.com/science/article/pii/S1084804523000410}
- . M. Hossain and A. El Saddik, “Time-Series Decomposition-Based Cyber Risk Estimation,” emph{IEEE Internet of Things Journal}, vol. 8, no. 3, pp. 1874–1883, 2021. Available: url{https://ieeexplore.ieee.org/document/9247164}
- . Y. Guo, J. Wang, and M. Li, “Dynamic Risk Modeling in Cloud Computing with Adaptive Feedback,” emph{IEEE Transactions on Cloud Computing}, vol. 10, no. 2, pp. 125–136, 2022. Available: url{https://ieeexplore.ieee.org/document/9520112}
- A. Yaseen, “Enhancing Cybersecurity Through Automated Infrastructure Optimization,” emph{ResearchGate}, Preprint, 2024. Available: url{https://www.researchgate.net/publication/378594258}
- . K. Huang, V. S. Narajala, J. Yeoh, R. Raskar, Y. Harkati, J. Huang, I. Habler & C. Hughes, “A Novel Zero‑Trust Identity Framework for Agentic AI: Decentralized Authentication and Fine‑Grained Access Control,” arXiv preprint arXiv:2505.19301, 2025. Available: url{https://arxiv.org/abs/2505.19301}
- . N. Kshetri, “Transforming Cybersecurity with Agentic AI to Combat Emerging Cyber Threats,” emph{Telecommunications Policy}, vol. 49, no. 6, 2025. Available: url{https://doi.org/10.1016/j.telpol.2025.102976}
- . B. Adusupalli, “Agentic AI‑Driven Identity and Access Management Framework for Secure Insurance Ecosystems,” emph{Journal of Computational Analysis and Applications}, vol. 33, no. 8, pp. 2794‑2814, 2024. Available: url{https://doi.org/10.63001/tbs.2024.v19.i02.S.I(1).p639‑645}
- A. Kumar Pati, “Agentic AI: A Comprehensive Survey of Technologies, Applications, and Societal Implications,” IEEE Access, 2024. Available: url{https://doi.org/10.1109/ACCESS.2024.0429000}
- . “AI Agents vs. Agentic AI: A Conceptual Taxonomy, Applications and Challenges,” emph{ScienceDirect}, 2025. Available: url{https://doi.org/10.1016/j.something.2025.??}
- . “A Survey on LLM‑Based Multi‑Agent Systems: Workflow, Infrastructure and Applications,” emph{Springer}, 2024. Available: url{https://doi.org/10.1007/s44336‑024‑00009‑2}
- . “Multi‑Agent Collaboration Mechanisms: A Survey of LLMs,” arXiv preprint arXiv:2501.06322, 2025. Available: url{https://arxiv.org/abs/2501.06322}
- . “From LLM Reasoning to Autonomous AI Agents,” arXiv preprint arXiv:2504.19678, 2025. Available: url{https://arxiv.org/abs/2504.19678}
- . Adabara, “Trustworthy Agentic AI Systems: A Cross‑Layer Review of Architectures, Risks & Governance,” emph{F1000Research}, 2025. Available: url{https://f1000research.com/articles/14-905}
- . R. Ranjan, S. Gupta & S. N. Singh, “Fairness in Agentic AI: A Unified Framework for Ethical and Equitable Multi‑Agent Systems,” arXiv preprint arXiv:2502.07254, 2025. Available: url{https://arxiv.org/abs/2502.07254}
- . Chinni, R., “Evaluating Adaptive Access Policies for Zero Trust Architectures in Modern Cybersecurity Environments,” in emph{2025 International Conference on Computing Technologies & Data Communication (ICCTDC)}, 2025, pp. 1--10, IEEE.
- . Adeel, S. M., “AI-Powered Cybersecurity Compliance: Bridging Regulations and Innovation,” emph{J Curr Trends Comp Sci Res}, vol. 4, no. 3, pp. 01–23, 2025. Available: url{https://www.opastpublishers.com/open-access-articles/aipowered-cybersecurity-compliance-bridging-regulations-and-innovation.pdf
-
Downloads
-
How to Cite
Karim, S. (2026). AI-Powered Autonomous Anomaly Detection in IAM: A Quantum-Resistant Deep Learning Framework with Real-Time Adaptive Risk Management and Federated Learning. International Journal of Applied Mathematical Research, 15(1), 1-17. https://doi.org/10.14419/wk6sd964
