Zero-Touch Continuous Audit with Hybrid Symbolic-Neural Reasoning

Authors

  • Prabhu Muthusamy Cognizant Technology Solutions, India Author
  • Gnanendra Reddy Muthirevula Tekvana Inc, USA Author
  • Abdul Samad Mohammed Dominos, USA Author

Keywords:

zero-touch audit, symbolic reasoning, neural embeddings, DevSecOps, audit trail, control failure detection

Abstract

In real time, Zero-Touch Continuous Audit architecture checks cloud-native DevSecOps pipeline compliance using hybrid symbolic-neural reasoning. Telemetry, configuration states, and CI/CD artifacts are considered as using symbolic policy logic and neural event embeddings which automatically signals and corrects control breaches. A cryptographically anchored audit trail is automatically created from screen captures, configuration diffs, and governance approvals.

Downloads

Download data is not yet available.

References

S. J. Russell and P. Norvig, Artificial Intelligence: A Modern Approach, 4th ed. Pearson, 2020.

D. M. Wolpert and E. K. Seung, “Hybrid symbolic and connectionist approaches to AI,” Annual Review of Neuroscience, vol. 43, pp. 235-260, 2023.

C. H. Lin, Y. K. Lin, and W. L. Huang, “Automated compliance checking using temporal logic in continuous integration pipelines,” IEEE Transactions on Software Engineering, vol. 48, no. 3, pp. 789–804, Mar. 2022.

P. J. Stuckey, K. A. L. Agrawal, and M. L. Sahl, “Declarative policy languages for real-time audit automation,” in Proc. 45th IEEE/IFIP Int. Conf. on Dependable Systems and Networks, 2023, pp. 112–123.

M. Alshammari and F. L. Al-Shaer, “Neural embeddings for event log semantic analysis,” IEEE Access, vol. 10, pp. 32812–32827, 2022.

J. Devlin et al., “BERT: Pre-training of deep bidirectional transformers for language understanding,” Proc. of NAACL-HLT, 2019, pp. 4171–4186.

A. Vaswani et al., “Attention is all you need,” in Advances in Neural Information Processing Systems, vol. 30, 2017, pp. 5998–6008.

L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, pp. 5–32, 2001.

A. K. Jain and B. Chandrasekaran, “Symbolic and connectionist models for knowledge representation,” IEEE Expert, vol. 11, no. 2, pp. 27–32, Apr. 1996.

Amazon Web Services, “AWS Config: Continuous compliance and configuration monitoring,” 2024.

Open Policy Agent (OPA) Community, “Open Policy Agent: Policy-based control for cloud native environments,” 2023.

D. F. Ferraiolo et al., “Policy automation and continuous compliance in DevSecOps,” IEEE Software, vol. 39, no. 4, pp. 45–52, Jul.-Aug. 2022.

R. S. Sandhu et al., “Role-based access control models,” Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996.

K. H. Kim and H. K. Kim, “Temporal logic-based event sequencing for anomaly detection,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1633–1645, 2023.

E. Bertino and N. Shafiq, “Data provenance and auditing in cloud computing,” IEEE Cloud Computing, vol. 9, no. 1, pp. 40–49, Jan.-Feb. 2022.

D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Proc. CRYPTO, 2001, pp. 213–229.

J. A. Stubblebine et al., “Digital signatures for tamper-evident audit trails,” IEEE Security & Privacy, vol. 10, no. 3, pp. 24–32, May-Jun. 2012.

S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf.

K. Ren et al., “Blockchain for secure and decentralized audit logs in cloud computing,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 2, pp. 558–571, Mar.-Apr. 2021.

S. Meier and S. Lewis, “Federated learning for privacy-preserving compliance monitoring,” in Proc. IEEE Int. Conf. on Big Data, 2024, pp. 234–243.

Downloads

Published

06-05-2025

How to Cite

[1]
Prabhu Muthusamy, Gnanendra Reddy Muthirevula, and Abdul Samad Mohammed, “Zero-Touch Continuous Audit with Hybrid Symbolic-Neural Reasoning”, Newark J. Hum. Centric AI Robot Inter., vol. 5, pp. 80–111, May 2025, Accessed: Dec. 20, 2025. [Online]. Available: https://www.njhcair.org/index.php/publication/article/view/66