Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline

被引:5
作者
Alevizos, Lampis [1 ]
Dekker, Martijn [2 ]
机构
[1] Univ Cent Lancashire UCLan, Sch Engn & Comp Sci, Preston PR1 2HE, England
[2] Univ Amsterdam, Fac Econ & Business, Amsterdam Business Sch, NL-1018 TV Amsterdam, Netherlands
关键词
artificial intelligence; cyber threat intelligence; cyber resilience; ethical considerations; CTI and AI biases; MODEL;
D O I
10.3390/electronics13112021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber threats continue to evolve in complexity, thereby traditional cyber threat intelligence (CTI) methods struggle to keep pace. AI offers a potential solution, automating and enhancing various tasks, from data ingestion to resilience verification. This paper explores the potential of integrating artificial intelligence (AI) into CTI. We provide a blueprint of an AI-enhanced CTI processing pipeline and detail its components and functionalities. The pipeline highlights the collaboration between AI and human expertise, which is necessary to produce timely and high-fidelity cyber threat intelligence. We also explore the automated generation of mitigation recommendations, harnessing AI's capabilities to provide real-time, contextual, and predictive insights. However, the integration of AI into CTI is not without its challenges. Thereby, we discuss the ethical dilemmas, potential biases, and the imperative for transparency in AI-driven decisions. We address the need for data privacy, consent mechanisms, and the potential misuse of technology. Moreover, we highlight the importance of addressing biases both during CTI analysis and within AI models, warranting their transparency and interpretability. Lastly, our work points out future research directions, such as the exploration of advanced AI models to augment cyber defenses, and human-AI collaboration optimization. Ultimately, the fusion of AI with CTI appears to hold significant potential in the cybersecurity domain.
引用
收藏
页数:19
相关论文
共 68 条
[1]   Malware Analysis and Detection Using Machine Learning Algorithms [J].
Akhtar, Muhammad Shoaib ;
Feng, Tao .
SYMMETRY-BASEL, 2022, 14 (11)
[2]  
Angelelli M, 2024, Arxiv, DOI arXiv:2302.08348
[3]  
[Anonymous], 2023, NIST Artificial Intelligence Risk Management Framework (AI RMF 1.0)
[4]  
[Anonymous], 2023, Information TechnologyArtificial IntelligenceAI System Life Cycle Processes
[5]   Big Data's Disparate Impact [J].
Barocas, Solon ;
Selbst, Andrew D. .
CALIFORNIA LAW REVIEW, 2016, 104 (03) :671-732
[6]  
Brown R., 2023, SANS 2023 CTI Survey: Keeping Up with a Changing Threat Landscape
[7]  
Brundage M, 2020, Arxiv, DOI [arXiv:2004.07213, 10.48550/arXiv.2004.07213, DOI 10.48550/ARXIV.2004.07213]
[8]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[9]   Defensive Distillation-Based Adversarial Attack Mitigation Method for Channel Estimation Using Deep Learning Models in Next-Generation Wireless Networks [J].
Catak, Ferhat Ozgur ;
Kuzlu, Murat ;
Catak, Evren ;
Cali, Umit ;
Guler, Ozgur .
IEEE ACCESS, 2022, 10 :98191-98203
[10]  
Chen CLP, 2015, 2015 IEEE 10TH JUBILEE INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), P17, DOI 10.1109/SACI.2015.7208200