Affiliation:
1. Norwegian University of Science and Technology, Trondheim, Norway
Abstract
Recent advancements in artificial intelligence (AI) technologies have induced tremendous growth in innovation and automation. Although these AI technologies offer significant benefits, they can be used maliciously. Highly targeted and evasive attacks in benign carrier applications, such as DeepLocker, have demonstrated the intentional use of AI for harmful purposes. Threat actors are constantly changing and improving their attack strategy with particular emphasis on the application of AI-driven techniques in the attack process, called
AI-based cyber attack
, which can be used in conjunction with conventional attack techniques to cause greater damage. Despite several studies on AI and security, researchers have not summarized AI-based cyber attacks enough to be able to understand the adversary’s actions and to develop proper defenses against such attacks. This study aims to explore existing studies of AI-based cyber attacks and to map them onto a proposed framework, providing insight into new threats. Our framework includes the classification of several aspects of malicious uses of AI during the cyber attack life cycle and provides a basis for their detection to predict future threats. We also explain how to apply this framework to analyze AI-based cyber attacks in a hypothetical scenario of a critical smart grid infrastructure.
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Reference89 articles.
1. Terrence Adams. 2017. AI-powered social bots. arXiv:1706.05143. Terrence Adams. 2017. AI-powered social bots. arXiv:1706.05143.
2. Dario Amodei Chris Olah Jacob Steinhardt Paul Christiano John Schulman and Dan Mané. 2016. Concrete problems in AI safety. arXiv:1606.06565. Dario Amodei Chris Olah Jacob Steinhardt Paul Christiano John Schulman and Dan Mané. 2016. Concrete problems in AI safety. arXiv:1606.06565.
3. DeepDGA
4. Who Controls the off Switch?
Cited by
153 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献