Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline

被引:5
作者
Alevizos, Lampis [1 ]
Dekker, Martijn [2 ]
机构
[1] Univ Cent Lancashire UCLan, Sch Engn & Comp Sci, Preston PR1 2HE, England
[2] Univ Amsterdam, Fac Econ & Business, Amsterdam Business Sch, NL-1018 TV Amsterdam, Netherlands
关键词
artificial intelligence; cyber threat intelligence; cyber resilience; ethical considerations; CTI and AI biases; MODEL;
D O I
10.3390/electronics13112021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber threats continue to evolve in complexity, thereby traditional cyber threat intelligence (CTI) methods struggle to keep pace. AI offers a potential solution, automating and enhancing various tasks, from data ingestion to resilience verification. This paper explores the potential of integrating artificial intelligence (AI) into CTI. We provide a blueprint of an AI-enhanced CTI processing pipeline and detail its components and functionalities. The pipeline highlights the collaboration between AI and human expertise, which is necessary to produce timely and high-fidelity cyber threat intelligence. We also explore the automated generation of mitigation recommendations, harnessing AI's capabilities to provide real-time, contextual, and predictive insights. However, the integration of AI into CTI is not without its challenges. Thereby, we discuss the ethical dilemmas, potential biases, and the imperative for transparency in AI-driven decisions. We address the need for data privacy, consent mechanisms, and the potential misuse of technology. Moreover, we highlight the importance of addressing biases both during CTI analysis and within AI models, warranting their transparency and interpretability. Lastly, our work points out future research directions, such as the exploration of advanced AI models to augment cyber defenses, and human-AI collaboration optimization. Ultimately, the fusion of AI with CTI appears to hold significant potential in the cybersecurity domain.
引用
收藏
页数:19
相关论文
共 68 条
[11]  
Chen HC, 2012, MIS QUART, V36, P1165
[12]   Lessons from Stuxnet [J].
Chen, Thomas M. ;
Abu-Nimeh, Saeed .
COMPUTER, 2011, 44 (04) :91-93
[13]  
Confido A., 2022, AEROSP CONF PROC, P1, DOI [10.1109/AERO53065.2022.9843459, DOI 10.1109/AERO53065.2022.9843459]
[14]  
Danks D, 2017, PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P4691
[15]   A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision-making [J].
Dekker, Martijn ;
Alevizos, Lampis .
SECURITY AND PRIVACY, 2024, 7 (01)
[16]  
DellAcqua F., 2024, Navigating the Jagged Technological Frontier: Field Experimental Evidence of the Effects of AI on Knowledge Worker Productivity and Quality
[17]   Increasing the Speed and Accuracy of Data Labeling Through an AI Assisted Interface [J].
Desmond, Michael ;
Muller, Michael ;
Ashktorab, Zahra ;
Dugan, Casey ;
Duesterwald, Evelyn ;
Brimijoin, Kristina ;
Finegan-Dollak, Catherine ;
Brachman, Michelle ;
Sharma, Aabhas ;
Joshi, Narendra Nath ;
Pan, Qian .
IUI '21 - 26TH INTERNATIONAL CONFERENCE ON INTELLIGENT USER INTERFACES, 2021, :392-401
[18]   Artificial Intelligence-Based Malware Detection, Analysis, and Mitigation [J].
Djenna, Amir ;
Bouridane, Ahmed ;
Rubab, Saddaf ;
Marou, Ibrahim Moussa .
SYMMETRY-BASEL, 2023, 15 (03)
[19]  
European Council, 2024, The European Parliament and the Council of the European Union, Directive (EU)
[20]  
Gebru T, 2021, Arxiv, DOI [arXiv:1803.09010, DOI 10.48550/ARXIV.1803.09010]