Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions

Erwin Adi, Z. Baig, S. Zeadally
{"title":"Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions","authors":"Erwin Adi, Z. Baig, S. Zeadally","doi":"10.5604/01.3001.0016.0800","DOIUrl":null,"url":null,"abstract":"Cybersecurity has benefitted from Artificial Intelligence (AI) technologies for attack detection. However, recent advances in AI techniques, in tandem with their misuse, have outpaced parallel advancements in cyberattack classification methods that have been achieved through academic and industry-led efforts. We describe the shift in the evolution of AI techniques, and we show how recent AI approaches are effective in helping an adversary attain his/her objectives appertaining to cyberattacks. We also discuss how the current architecture of computer communications enables the development of AI-based adversarial threats against heterogeneous computing platforms and infrastructures.\n\n","PeriodicalId":123092,"journal":{"name":"Applied Cybersecurity & Internet Governance","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Cybersecurity & Internet Governance","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5604/01.3001.0016.0800","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Cybersecurity has benefitted from Artificial Intelligence (AI) technologies for attack detection. However, recent advances in AI techniques, in tandem with their misuse, have outpaced parallel advancements in cyberattack classification methods that have been achieved through academic and industry-led efforts. We describe the shift in the evolution of AI techniques, and we show how recent AI approaches are effective in helping an adversary attain his/her objectives appertaining to cyberattacks. We also discuss how the current architecture of computer communications enables the development of AI-based adversarial threats against heterogeneous computing platforms and infrastructures.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络安全中的人工智能:进攻战术、缓解技术和未来方向
网络安全得益于用于攻击检测的人工智能技术。然而,人工智能技术的最新进展,以及它们的滥用,已经超过了通过学术和行业主导的努力实现的网络攻击分类方法的并行进展。我们描述了人工智能技术发展的转变,并展示了最近的人工智能方法如何有效地帮助对手实现他/她的网络攻击目标。我们还讨论了当前的计算机通信体系结构如何使针对异构计算平台和基础设施的基于人工智能的对抗性威胁的发展成为可能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Assessing Power and Hierarchy in Cyberspace: An Approach of Power Transition Theory Introduction to Special Issue on The Russian-Ukrainian War: Effects on Global Cybersecurity and Digital Infrastructure Stronger together? EU Support for Ukrainian Local Authorities Facing Cyber Attacks (2022-2023) Post-Truth and Information Warfare in their Technological Context Investment in Cybersecurity Companies in Times of Political and Economic Instability
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1