攻击性人工智能:通过gpt-2模型统一电子邮件生成,并采用针对鱼叉式网络钓鱼攻击的博弈论方法

Hamzullah Khan, M. Alam, S. Al-Kuwari, Y. Faheem
{"title":"攻击性人工智能:通过gpt-2模型统一电子邮件生成,并采用针对鱼叉式网络钓鱼攻击的博弈论方法","authors":"Hamzullah Khan, M. Alam, S. Al-Kuwari, Y. Faheem","doi":"10.1049/icp.2021.2422","DOIUrl":null,"url":null,"abstract":"A rising digital economy implies more cybersecurity challenges. As organisations continue with their digital transformations, they need to implement pervasive cyber defense measures to comply with the corresponding severe security threats. The number of organisations and individuals falling victim to targeted attacks such as spear-phishing attacks is growing rapidly. Regardless of substantial exploration in mitigation systems, attackers today are becoming more sophisticated as they cultivate their techniques, employing advanced natural language (NL) capabilities to deceive email security systems. Game theory approaches based on cybersecurity are mostly concentrated on proposing defence algorithms against attacks. This work is comprehensively centred on the role of the attacker in spear-phishing attacks, using OpenAI text generating model Generative Pre-trained Transformer 2 (GPT-2) to generate emails with various malicious content. Attackers use those emails to attack a target and attempt to deceive the defence system. Considering the lack of theoretic analysis from the attacker's perspective, a non-cooperative zero-sum spear-phishing game model is proposed that allows an attacker to choose an optimal strategy for maximising payoff. Moreover, we calculated the Nash equilibrium (NE) in mixed strategies for the attacker-defender game and provided a reasonable scheme for an attacker to gain an advantage over the target.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"OFFENSIVE AI: UNIFICATION OF EMAIL GENERATION THROUGH GPT-2 MODEL WITH A GAME-THEORETIC APPROACH FOR SPEAR-PHISHING ATTACKS\",\"authors\":\"Hamzullah Khan, M. Alam, S. Al-Kuwari, Y. Faheem\",\"doi\":\"10.1049/icp.2021.2422\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A rising digital economy implies more cybersecurity challenges. As organisations continue with their digital transformations, they need to implement pervasive cyber defense measures to comply with the corresponding severe security threats. The number of organisations and individuals falling victim to targeted attacks such as spear-phishing attacks is growing rapidly. Regardless of substantial exploration in mitigation systems, attackers today are becoming more sophisticated as they cultivate their techniques, employing advanced natural language (NL) capabilities to deceive email security systems. Game theory approaches based on cybersecurity are mostly concentrated on proposing defence algorithms against attacks. This work is comprehensively centred on the role of the attacker in spear-phishing attacks, using OpenAI text generating model Generative Pre-trained Transformer 2 (GPT-2) to generate emails with various malicious content. Attackers use those emails to attack a target and attempt to deceive the defence system. Considering the lack of theoretic analysis from the attacker's perspective, a non-cooperative zero-sum spear-phishing game model is proposed that allows an attacker to choose an optimal strategy for maximising payoff. Moreover, we calculated the Nash equilibrium (NE) in mixed strategies for the attacker-defender game and provided a reasonable scheme for an attacker to gain an advantage over the target.\",\"PeriodicalId\":254750,\"journal\":{\"name\":\"Competitive Advantage in the Digital Economy (CADE 2021)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Competitive Advantage in the Digital Economy (CADE 2021)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/icp.2021.2422\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Advantage in the Digital Economy (CADE 2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/icp.2021.2422","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

数字经济的崛起意味着更多的网络安全挑战。随着组织继续进行数字化转型,他们需要实施无处不在的网络防御措施,以应对相应的严重安全威胁。成为针对性攻击(如鱼叉式网络钓鱼攻击)受害者的组织和个人数量正在迅速增长。尽管对缓解系统进行了大量的探索,但如今的攻击者随着技术的发展变得越来越复杂,他们利用先进的自然语言(NL)能力来欺骗电子邮件安全系统。基于网络安全的博弈论方法主要集中在提出针对攻击的防御算法。这项工作全面集中在攻击者在鱼叉式网络钓鱼攻击中的作用,使用OpenAI文本生成模型生成预训练变压器2 (GPT-2)生成具有各种恶意内容的电子邮件。攻击者利用这些电子邮件攻击目标,并试图欺骗防御系统。针对缺乏从攻击者角度进行理论分析的问题,提出了一种非合作零和鱼叉式网络钓鱼博弈模型,该模型允许攻击者选择最优策略以获得最大收益。在此基础上,计算了攻击防御博弈混合策略下的纳什均衡(NE),给出了攻击方获得相对于目标方优势的合理方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
OFFENSIVE AI: UNIFICATION OF EMAIL GENERATION THROUGH GPT-2 MODEL WITH A GAME-THEORETIC APPROACH FOR SPEAR-PHISHING ATTACKS
A rising digital economy implies more cybersecurity challenges. As organisations continue with their digital transformations, they need to implement pervasive cyber defense measures to comply with the corresponding severe security threats. The number of organisations and individuals falling victim to targeted attacks such as spear-phishing attacks is growing rapidly. Regardless of substantial exploration in mitigation systems, attackers today are becoming more sophisticated as they cultivate their techniques, employing advanced natural language (NL) capabilities to deceive email security systems. Game theory approaches based on cybersecurity are mostly concentrated on proposing defence algorithms against attacks. This work is comprehensively centred on the role of the attacker in spear-phishing attacks, using OpenAI text generating model Generative Pre-trained Transformer 2 (GPT-2) to generate emails with various malicious content. Attackers use those emails to attack a target and attempt to deceive the defence system. Considering the lack of theoretic analysis from the attacker's perspective, a non-cooperative zero-sum spear-phishing game model is proposed that allows an attacker to choose an optimal strategy for maximising payoff. Moreover, we calculated the Nash equilibrium (NE) in mixed strategies for the attacker-defender game and provided a reasonable scheme for an attacker to gain an advantage over the target.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Comparative Analysis of LSTM-FCN on Multiple Datasets 5G SECURITY THREATS AFFECTING DIGITAL ECONOMY AND THEIR COUNTERMEASURES PRIVACY PRESERVATION IN DIGITAL ECONOMY PLATFORMS PRIVACY-PRESERVING AUTHENTICATION SCHEME FOR VANETS IN DIGITAL ECONOMY INVESTIGATING THE IMPACT OF UNDERLYING HEALTH CONDITIONS ON PRIVACY CONCERNS OF IOT HEALTHCARE DEVICES
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1