The Al-Based Cyber Threat Landscape: A Survey

被引:109
|
作者
Kaloudi, Nektaria [1 ]
Li, Jingyue [1 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
关键词
Cybersecurity; AI attacks; cyber threat prevention; cyber-physical systems; smart grid; attack analysis; SMART; ATTACKS; SYSTEMS; PRIVACY;
D O I
10.1145/3372823
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent advancements in artificial intelligence (AI) technologies have induced tremendous growth in innovation and automation. Although these AI technologies offer significant benefits, they can be used maliciously. Highly targeted and evasive attacks in benign carrier applications, such as DeepLocker, have demonstrated the intentional use of AI for harmful purposes. Threat actors are constantly changing and improving their attack strategy with particular emphasis on the application of AI-driven techniques in the attack process, called AI-based cyber attack, which can be used in conjunction with conventional attack techniques to cause greater damage. Despite several studies on AI and security, researchers have not summarized AI-based cyber attacks enough to be able to understand the adversary's actions and to develop proper defenses against such attacks. This study aims to explore existing studies of AI-based cyber attacks and to map them onto a proposed framework, providing insight into new threats. Our framework includes the classification of several aspects of malicious uses of AI during the cyber attack life cycle and provides a basis for their detection to predict future threats. We also explain how to apply this framework to analyze AI-based cyber attacks in a hypothetical scenario of a critical smart grid infrastructure.
引用
收藏
页数:34
相关论文
共 50 条
  • [21] Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems
    AboulEla, Samar
    Ibrahim, Nourhan
    Shehmir, Sarama
    Yadav, Aman
    Kashef, Rasha
    AI, 2024, 5 (02) : 704 - 732
  • [22] Unraveling the dynamics of the cyber threat landscape: Major shifts examined through the recent societal events
    Song, Uihyeon
    Hur, Gimin
    Lee, Sangjin
    Park, Jungheum
    SUSTAINABLE CITIES AND SOCIETY, 2024, 103
  • [23] Fog-based storage technology to fight with cyber threat
    Wang, Tian
    Zhou, Jiyuan
    Huang, Minzhe
    Bhuiyan, Zakirul Alam
    Liu, Anfeng
    Xu, Wenzheng
    Xie, Mande
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 83 : 208 - 218
  • [24] Cyber-Physical Systems Security-A Survey
    Humayed, Abdulmalik
    Lin, Jingqiang
    Li, Fengjun
    Luo, Bo
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 1802 - 1831
  • [25] Cyber Security Threat Intelligence Sharing Model Based on Blockchain
    Huang K.
    Lian Y.
    Feng D.
    Zhang H.
    Liu Y.
    Ma X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (04): : 836 - 846
  • [26] Analysis of Evolutionary Algorithm based Optimization for Cyber Threat Modeling
    Wright, Joseph Grady, V
    Sevil, Hakki Erhan
    Francia, Guillermo, III
    Youssef, Tarek
    Ghosh, Tirthankar
    Hall, Gregory
    SOUTHEASTCON 2022, 2022, : 751 - 756
  • [27] Cyber threat indicators extraction based on contextual knowledge prompt
    Tang, Hailiang
    Lin, Dawei
    Li, Wanyu
    Zhang, Wenxiao
    Zhao, Jun
    COMPUTER NETWORKS, 2024, 254
  • [28] Cyber Security Issues and Challenges for Smart Cities: A survey
    Hamid, Bushra
    Jhanjhi, N. Z.
    Humayun, Mamoona
    Khan, Azeem
    Alsayat, Ahmed
    2019 13TH INTERNATIONAL CONFERENCE ON MATHEMATICS, ACTUARIAL SCIENCE, COMPUTER SCIENCE AND STATISTICS (MACS-13), 2019,
  • [29] A Model of APT Attack Defense Based on Cyber Threat Detection
    Li, Yue
    Zhang, Teng
    Li, Xue
    Li, Ting
    CYBER SECURITY, CNCERT 2018, 2019, 970 : 122 - 135
  • [30] CYBER THREAT MODELING FRAMEWORK
    Raposo de Melo, Renato Carvalho
    Albuquerque, Robson de Oliveira
    Lopes de Mendonca, Fabio Lficio
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,