The Al-Based Cyber Threat Landscape: A Survey

被引:104
|
作者
Kaloudi, Nektaria [1 ]
Li, Jingyue [1 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
关键词
Cybersecurity; AI attacks; cyber threat prevention; cyber-physical systems; smart grid; attack analysis; SMART; ATTACKS; SYSTEMS; PRIVACY;
D O I
10.1145/3372823
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent advancements in artificial intelligence (AI) technologies have induced tremendous growth in innovation and automation. Although these AI technologies offer significant benefits, they can be used maliciously. Highly targeted and evasive attacks in benign carrier applications, such as DeepLocker, have demonstrated the intentional use of AI for harmful purposes. Threat actors are constantly changing and improving their attack strategy with particular emphasis on the application of AI-driven techniques in the attack process, called AI-based cyber attack, which can be used in conjunction with conventional attack techniques to cause greater damage. Despite several studies on AI and security, researchers have not summarized AI-based cyber attacks enough to be able to understand the adversary's actions and to develop proper defenses against such attacks. This study aims to explore existing studies of AI-based cyber attacks and to map them onto a proposed framework, providing insight into new threats. Our framework includes the classification of several aspects of malicious uses of AI during the cyber attack life cycle and provides a basis for their detection to predict future threats. We also explain how to apply this framework to analyze AI-based cyber attacks in a hypothetical scenario of a critical smart grid infrastructure.
引用
收藏
页数:34
相关论文
共 50 条
  • [1] Al-Based Deterrence in the Cyber Domain
    Chen, Jim
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 38 - 45
  • [2] The cyber threat landscape
    Sutton, Martin
    Journal of the Institute of Telecommunications Professionals, 2020, 14 : 30 - 35
  • [3] Cyber Threat Landscape in Cyber Space
    Shanker, Anusha Kadambari
    Usha, G.
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 375 - 380
  • [4] A survey on cyber threat intelligence sharing based on Blockchain
    Ahmed El-Kosairy
    Nashwa Abdelbaki
    Heba Aslan
    Advances in Computational Intelligence, 2023, 3 (3):
  • [5] Cyber Threat Landscape in Energy Sector
    Kovanen, Tiina
    Nuojua, Viivi
    Lehto, Martti
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 353 - 361
  • [6] Cyber Technological Paradigms and Threat Landscape in India
    Patil, Krutika
    STRATEGIC ANALYSIS, 2022, 46 (03) : 354 - 356
  • [7] Cyber Technological Paradigms and Threat Landscape in India
    Bhangoo, Har Sandeep Kaur
    MILLENNIAL ASIA, 2022, 13 (03) : 532 - 535
  • [8] Cyber-threat landscape of border control infrastructures
    Chatzis, Petros
    Stavrou, Eliana
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2022, 36
  • [9] Cyber-threat landscape of border control infrastructures
    Chatzis, Petros
    Stavrou, Eliana
    International Journal of Critical Infrastructure Protection, 2022, 36
  • [10] The cyber threat landscape: Challenges and future research directions
    Choo, Kim-Kwang Raymond
    COMPUTERS & SECURITY, 2011, 30 (08) : 719 - 731