The Al-Based Cyber Threat Landscape: A Survey

被引:104
|
作者
Kaloudi, Nektaria [1 ]
Li, Jingyue [1 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
关键词
Cybersecurity; AI attacks; cyber threat prevention; cyber-physical systems; smart grid; attack analysis; SMART; ATTACKS; SYSTEMS; PRIVACY;
D O I
10.1145/3372823
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent advancements in artificial intelligence (AI) technologies have induced tremendous growth in innovation and automation. Although these AI technologies offer significant benefits, they can be used maliciously. Highly targeted and evasive attacks in benign carrier applications, such as DeepLocker, have demonstrated the intentional use of AI for harmful purposes. Threat actors are constantly changing and improving their attack strategy with particular emphasis on the application of AI-driven techniques in the attack process, called AI-based cyber attack, which can be used in conjunction with conventional attack techniques to cause greater damage. Despite several studies on AI and security, researchers have not summarized AI-based cyber attacks enough to be able to understand the adversary's actions and to develop proper defenses against such attacks. This study aims to explore existing studies of AI-based cyber attacks and to map them onto a proposed framework, providing insight into new threats. Our framework includes the classification of several aspects of malicious uses of AI during the cyber attack life cycle and provides a basis for their detection to predict future threats. We also explain how to apply this framework to analyze AI-based cyber attacks in a hypothetical scenario of a critical smart grid infrastructure.
引用
收藏
页数:34
相关论文
共 50 条
  • [21] Al-Based Amorphous Metallic Plastics
    Gao, Meng
    Perepezko, John H.
    ADVANCED ENGINEERING MATERIALS, 2019, 21 (04)
  • [22] Nanocrystallization in Al-based amorphous alloys
    Zhong, ZC
    Jiang, XY
    Greer, AL
    PHILOSOPHICAL MAGAZINE B-PHYSICS OF CONDENSED MATTER STATISTICAL MECHANICS ELECTRONIC OPTICAL AND MAGNETIC PROPERTIES, 1997, 76 (04): : 505 - 510
  • [23] Novel Al-Based FLP Systems
    Uhl, Werner
    Wuerthwein, Ernst-Ulrich
    FRUSTRATED LEWIS PAIRS II: EXPANDING THE SCOPE, 2013, 334 : 101 - 119
  • [24] The reactivity of Al-based "mechanochemical" nanocomposites
    Streletskii, A. N.
    Kolbanev, I. V.
    Permenov, D. G.
    Povstugar, I. V.
    Borunova, A. B.
    Dolgoborodov, A. Yu.
    Makhov, M. N.
    Butyagin, P. Yu.
    REVIEWS ON ADVANCED MATERIALS SCIENCE, 2008, 18 (04) : 353 - 359
  • [25] Melting entropy of Al-based quasicrystals
    Holland-Moritz, D
    Iu, IR
    Wilde, G
    Schroers, J
    Grushko, B
    JOURNAL OF NON-CRYSTALLINE SOLIDS, 1999, 250 : 829 - 832
  • [26] Cyber threat
    Herzenberg, Caroline
    NEW SCIENTIST, 2013, 219 (2936) : 32 - 32
  • [27] Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
    Gao, Peng
    Shao, Fei
    Liu, Xiaoyuan
    Xiao, Xusheng
    Qin, Zheng
    Xu, Fengyuan
    Mittal, Prateek
    Kulkarni, Sanjeev R.
    Song, Dawn
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 193 - 204
  • [28] An exploratory analysis of the DPRK cyber threat landscape using publicly available reports
    Lyu, Jeonggak
    Song, Ahyun
    Seo, Euiseong
    Kim, Gibum
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [29] Surveying Cyber Threat Intelligence and Collaboration: A Concise Analysis of Current Landscape and Trends
    Radoglou-Grammatikis, Panagiotis
    Kioseoglou, Elisavet
    Asimopoulos, Dimitrios
    Siavvas, Miltiadis
    Nanos, Ioannis
    Lagkas, Thomas
    Argyriou, Vasileios
    Psannis, Konstantinos E.
    Goudos, Sotirios
    Sarigiannidis, Panagiotis
    2023 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE, CLOUDCOM 2023, 2023, : 309 - 314
  • [30] Current approaches and future directions for Cyber Threat Intelligence sharing: A survey
    Alaeifar, Poopak
    Pal, Shantanu
    Jadidi, Zahra
    Hussain, Mukhtar
    Foo, Ernest
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83