The Al-Based Cyber Threat Landscape: A Survey

被引:109
|
作者
Kaloudi, Nektaria [1 ]
Li, Jingyue [1 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
关键词
Cybersecurity; AI attacks; cyber threat prevention; cyber-physical systems; smart grid; attack analysis; SMART; ATTACKS; SYSTEMS; PRIVACY;
D O I
10.1145/3372823
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent advancements in artificial intelligence (AI) technologies have induced tremendous growth in innovation and automation. Although these AI technologies offer significant benefits, they can be used maliciously. Highly targeted and evasive attacks in benign carrier applications, such as DeepLocker, have demonstrated the intentional use of AI for harmful purposes. Threat actors are constantly changing and improving their attack strategy with particular emphasis on the application of AI-driven techniques in the attack process, called AI-based cyber attack, which can be used in conjunction with conventional attack techniques to cause greater damage. Despite several studies on AI and security, researchers have not summarized AI-based cyber attacks enough to be able to understand the adversary's actions and to develop proper defenses against such attacks. This study aims to explore existing studies of AI-based cyber attacks and to map them onto a proposed framework, providing insight into new threats. Our framework includes the classification of several aspects of malicious uses of AI during the cyber attack life cycle and provides a basis for their detection to predict future threats. We also explain how to apply this framework to analyze AI-based cyber attacks in a hypothetical scenario of a critical smart grid infrastructure.
引用
收藏
页数:34
相关论文
共 50 条
  • [31] An autoML network traffic analyzer for cyber threat detection
    Papanikolaou, Alexandros
    Alevizopoulos, Aggelos
    Ilioudis, Christos
    Demertzis, Konstantinos
    Rantos, Konstantinos
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1511 - 1530
  • [32] Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning
    Ghaleb, Fuad A.
    Alsaedi, Mohammed
    Saeed, Faisal
    Ahmad, Jawad
    Alasli, Mohammed
    SENSORS, 2022, 22 (09)
  • [33] Exploring the Cyber-Physical Threat Landscape of Water Systems: A Socio-Technical Modelling Approach
    Moraitis, Georgios
    Sakki, Georgia-Konstantina
    Karavokiros, George
    Nikolopoulos, Dionysios
    Tsoukalas, Ioannis
    Kossieris, Panagiotis
    Makropoulos, Christos
    WATER, 2023, 15 (09)
  • [34] A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs)
    Sun, Xiaoqiang
    Yu, F. Richard
    Zhang, Peng
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) : 6240 - 6259
  • [35] SDN-based cyber defense: A survey
    Yurekten, Ozgur
    Demirci, Mehmet
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 : 126 - 149
  • [36] Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames
    Vaseashta, Ashok
    Susmann, Philip
    Braman, Eric
    CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 1 - 10
  • [37] Cyber security challenges for IoT-based smart grid networks
    Kimani, Kenneth
    Oduol, Vitalice
    Langat, Kibet
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2019, 25 : 36 - 49
  • [38] Improved Cyber Threat Indicator Sharing by Scoring Privacy Risk
    Best, Daniel M.
    Bhatia, Jaspreet
    Peterson, Elena S.
    Breaux, Travis D.
    2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2017,
  • [39] A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems
    Segovia-Ferreira, Mariana
    Rubio-Hernan, Jose
    Cavalli, Ana Rosa
    Garcia-Alfaro, Joaquin
    ACM COMPUTING SURVEYS, 2024, 56 (08)
  • [40] The impacts of cyber threat in the maritime ecosystem
    Turner, Adam
    McCombie, Stephen James
    Uhlmann, Allon J.
    FRONTIERS IN COMPUTER SCIENCE, 2024, 6