Affiliation:
1. Taylor's University, Malaysia
2. Universiti Malaysia Sarawak, Malaysia
3. University of East London, UK
4. Bahria University, Islamabad, Pakistan
5. Institute of Business Management, Karachi, Pakistan
Abstract
Protecting AI in web applications is necessary. This domain is a composite of technology and huge scope with good prospects and immense difficulties. This chapter covers the landscape of security issues with advancing generative AI techniques for integration into web development frameworks. The initial section is on security in web development—a conversation on the subtleties of generative AI-based methods. In a literal stance, the chapter offers 13 ways to approach it. Among the threats are those that introduce security issues related to generative AI deployments, which illustrate why it is vital for defenders and infrastructure owners to implement mitigation measures proactively. This chapter pertains to the security and privacy of data and lessons for securing and preventing vulnerability. The chapter explores attacks, model poisoning, bias issues, defence mechanisms, and long-term mitigation strategies. Additionally, Service A promotes transparency, explainability, and compliance with applicable laws while structuring a development methodology and deployment methods/operation. The text outlines how to respond and recover from incidents as it provides response frameworks for everyone involved in managing security breaches. Finally, it addresses trends, possible threats, and lessons learned from real-world case studies. In order to contribute to addressing these research needs, this chapter sheds light on the security considerations associated with AI for web development and suggests recommendations that can help researchers, practitioners, and policymakers enhance the security posture of popular generative AI advancements used in generating web applications.
Reference162 articles.
1. Ξενάκης, X., Xenakis, C., Συστημάτων, Σ. T. Π. K. E. T. Ψ., & Συστημάτων, A. Ψ. (2023, March 21). Adversarial machine learning attacks against network intrusion detection systems. https://dione.lib.unipi.gr/xmlui/handle/unipi/15335
2. Machine learning in identity and access management systems: Survey and deep dive
3. Navigating the confluence of artificial intelligence and education for sustainable development in the era of industry 4.0: Challenges, opportunities, and ethical dimensions
4. Agbede, O. M. (2023). Incident handling and response process in security operations. Theseus. https://www.theseus.fi/handle/10024/795764
5. Challenges and Solutions in Network Security for Serverless Computing