Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain

被引:8
作者
Chomiak-Orsa, Iwona [1 ]
Rot, Artur [1 ]
Blaicke, Bartosz [1 ,2 ]
机构
[1] Wroclaw Univ Econ, Wroclaw, Poland
[2] McKinsey & Co Inc, Berlin, Germany
来源
COMPUTATIONAL COLLECTIVE INTELLIGENCE, PT II | 2019年 / 11684卷
关键词
Cybersecurity; Artificial Intelligence; AI; Security controls; Cyber kill chain;
D O I
10.1007/978-3-030-28374-2_35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The current challenge with defense against cyberattacks is that the speed and quantity of threats often outpace human-centered cyber defense capabilities. That is why a new Artificial Intelligence driven approach may enhance the effectiveness of security controls. However, it can also be used by adversaries to create more sophisticated and adaptable attack mechanisms. Distinguishing three key AI capabilities (knowledge acquisition, human-like perception and decision making), the goal of this paper is to assert where within the cyber kill chain have AI capabilities already been applied, and which phase holds the greatest near-term potential given recent developments and publications. Based on literature review, authors see the strongest potential for deploying AI capabilities during the reconnaissance, intrusion, privilege escalation and data exfiltration steps of the cyber kill chain with other uses being deployed in the remaining steps.
引用
收藏
页码:406 / 416
页数:11
相关论文
共 28 条
[1]   Insider threat Detection using Log analysis and Event Correlation [J].
Ambre, Amruta ;
Shekokar, Narendra .
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 :436-445
[2]  
Baker W., 2018, RSA C SAN FRANC
[3]  
Balraj Balla Prashanth, 2018, P INT C SMART CIT EM, P1, DOI [10.1109/ICSCET.2018.8537344, DOI 10.1109/ICSCET.2018.8537344]
[4]  
Baruah S., 2019, INT J COMPUT INTELL, V2, P7
[5]  
Brashear J., 2016, NEW NORMAL EXPONENTI
[6]   A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records [J].
Breier, Jakub ;
Branisova, Jana .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) :497-511
[7]  
Goosen R., ARTIFICIAL INTELLIGE
[8]  
Heinemeyer M., THWARTING INVISIBLE
[9]  
Hitaj B., 2018, NEURLPS 2018 WORKSH
[10]  
Hospelhorn S., VARONIS WHAT IS CYBE