全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Navigating AI Cybersecurity: Evolving Landscape and Challenges

DOI: 10.4236/jilsa.2024.163010, PP. 155-174

Keywords: AI Cybersecurity, Adversarial Attacks, Defensive Strategies, Ethical AI

Full-Text   Cite this paper   Add to My Lib

Abstract:

The rapid integration of artificial intelligence (AI) into critical sectors has revealed a complex landscape of cybersecurity challenges that are unique to these advanced technologies. AI systems, with their extensive data dependencies and algorithmic complexities, are susceptible to a broad spectrum of cyber threats that can undermine their functionality and compromise their integrity. This paper provides a detailed analysis of these threats, which include data poisoning, adversarial attacks, and systemic vulnerabilities that arise from the AI’s operational and infrastructural frameworks. This paper critically examines the effectiveness of existing defensive mechanisms, such as adversarial training and threat modeling, that aim to fortify AI systems against such vulnerabilities. In response to the limitations of current approaches, this paper explores a comprehensive framework for the design and implementation of robust AI systems. This framework emphasizes the development of dynamic, adaptive security measures that can evolve in response to new and emerging cyber threats, thereby enhancing the resilience of AI systems. Furthermore, the paper addresses the ethical dimensions of AI cybersecurity, highlighting the need for strategies that not only protect systems but also preserve user privacy and ensure fairness across all operations. In addition to current strategies and ethical concerns, this paper explores future directions in AI cybersecurity.

References

[1]  Mallick, M.A.I. and Nath, R. (2024) Navigating the Cyber Security Landscape: A Comprehensive Review of Cyber-Attacks, Emerging Trends, and Recent Developments. World Scientific News, 190, 1-69.
[2]  Aldoseri, A., Al-Khalifa, K.N. and Hamouda, A.M. (2023) Re-Thinking Data Strategy and Integration for Artificial Intelligence: Concepts, Opportunities, and Challenges. Applied Sciences, 13, Article 7082.
https://doi.org/10.3390/app13127082
[3]  Goni, A., Jahangir, M.U.F. and Chowdhury, R.R. (2024) A Study on Cyber Security: Analyzing Current Threats, Navigating Complexities, and Implementing Prevention Strategies. International Journal of Research and Scientific Innovation, 10, 507-522.
https://doi.org/10.51244/ijrsi.2023.1012039
[4]  Thakur, M. (2024) Cyber Security Threats and Countermeasures in Digital Age. Journal of Applied Science and Education (JASE), 4, 1-20.
[5]  Camacho, N.G. (2024) The Role of AI in Cybersecurity: Addressing Threats in the Digital Age. Journal of Artificial Intelligence General Science, 3, 143-154.
https://doi.org/10.60087/jaigs.v3i1.75
[6]  Mohamed, N. (2023) Current Trends in AI and ML for Cybersecurity: A State-of-the-Art Survey. Cogent Engineering, 10, Article 2272358.
https://doi.org/10.1080/23311916.2023.2272358
[7]  Kaloudi, N. and Li, J. (2020) The AI-Based Cyber Threat Landscape: A Survey. ACM Computing Surveys, 53, Article No. 20.
https://doi.org/10.1145/3372823
[8]  Guembe, B., Azeta, A., Misra, S., Osamor, V.C., Fernandez-Sanz, L. and Pospelova, V. (2022) The Emerging Threat of AI-Driven Cyber Attacks: A Review. Applied Artificial Intelligence, 36, Article 2037254.
https://doi.org/10.1080/08839514.2022.2037254
[9]  Sun, G., Cong, Y., Dong, J., Wang, Q., Lyu, L. and Liu, J. (2022) Data Poisoning Attacks on Federated Machine Learning. IEEE Internet of Things Journal, 9, 11365-11375.
https://doi.org/10.1109/jiot.2021.3128646
[10]  Tufail, S., Batool, S. and Sarwat, A.I. (2021) False Data Injection Impact Analysis in AI-Based Smart Grid. SoutheastCon 2021, Atlanta, 10-13 March 2021, 1-7.
https://doi.org/10.1109/southeastcon45413.2021.9401940
[11]  De Mello, F.L. (2020) A Survey on Machine Learning Adversarial Attacks. Journal of Information Security and Cryptography (Enigma), 7, 1-7.
https://doi.org/10.17648/jisc.v7i1.76
[12]  Sadeghi, K., Banerjee, A. and Gupta, S.K.S. (2020) A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning. IEEE Transactions on Emerging Topics in Computational Intelligence, 4, 450-467.
https://doi.org/10.1109/tetci.2020.2968933
[13]  Ramirez, M.A., Kim, S.K., Hamadi, H.A., Damiani, E., Byon, Y.J., Kim, T.Y., Yeun, C.Y., et al. (2022) Poisoning Attacks and Defenses on Artificial Intelligence: A Survey. arXiv: 2202.10276.
https://doi.org/10.48550/arXiv.2202.10276
[14]  Zhou, S., Zhu, T., Ye, D., Zhou, W. and Zhao, W. (2024) Inversion-Guided Defense: Detecting Model Stealing Attacks by Output Inverting. IEEE Transactions on Information Forensics and Security, 19, 4130-4145.
https://doi.org/10.1109/tifs.2024.3376190
[15]  Chesterman, S. (2024) Good Models Borrow, Great Models Steal: Intellectual Property Rights and Generative AI. Policy and Society, puae006.
https://doi.org/10.1093/polsoc/puae006
[16]  Zhao, X., Zhang, W., Xiao, X. and Lim, B. (2021) Exploiting Explanations for Model Inversion Attacks. 2021 IEEE/CVF International Conference on Computer Vision (ICCV), Montreal, 10-17 October 2021, 662-672.
https://doi.org/10.1109/iccv48922.2021.00072
[17]  Thuraisingham, B.M. (2020) Can AI Be for Good in the Midst of Cyber Attacks and Privacy Violations? A Position Paper. Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, New Orleans, 16-18 March 2020, 1-4.
https://doi.org/10.1145/3374664.3379334
[18]  Su, G., Wang, J., Xu, X., Wang, Y. and Wang, C. (2024) The Utilization of Homomorphic Encryption Technology Grounded on Artificial Intelligence for Privacy Preservation. International Journal of Computer Science and Information Technology, 2, 52-58.
https://doi.org/10.62051/ijcsit.v2n1.07
[19]  Roshanaei, M. (2024) Enhancing Mobile Security through Comprehensive Penetration Testing. Journal of Information Security, 15, 63-86.
https://doi.org/10.4236/jis.2024.152006
[20]  Rawal, A., Rawat, D.B. and Sadler, B. (2021) Recent Advances in Adversarial Machine Learning: Status, Challenges and Perspectives. Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications III, 117462Q.
https://doi.org/10.1117/12.2583970
[21]  Khayyam, H., Javadi, B., Jalili, M. and Jazar, R.N. (2020) Artificial Intelligence and Internet of Things for Autonomous Vehicles. In: Jazar, R. and Dai, L., Eds., Nonlinear Approaches in Engineering Applications, Springer, 39-68.
https://doi.org/10.1007/978-3-030-18963-1_2
[22]  Sagar, R., Jhaveri, R. and Borrego, C. (2020) Applications in Security and Evasions in Machine Learning: A Survey. Electronics, 9, Article 97.
https://doi.org/10.3390/electronics9010097
[23]  Gupta, R., Tanwar, S., Tyagi, S. and Kumar, N. (2020) Machine Learning Models for Secure Data Analytics: A Taxonomy and Threat Model. Computer Communications, 153, 406-440.
https://doi.org/10.1016/j.comcom.2020.02.008
[24]  Roshanaei, M. and Duan, Q. (2021) International Telecommunication Union Standardization for Trust Provisioning in Information, Communication and Technology Infrastructure toward Achieving United Nation’s Sustainable Development Goals. Journal of Computer and Communications, 9, 44-59.
https://doi.org/10.4236/jcc.2021.910004
[25]  Wang, J., Tuyls, J., Wallace, E. and Singh, S. (2020) Gradient-Based Analysis of NLP Models Is Manipulable. Findings of the Association for Computational Linguistics: EMNLP 2020, 16-20 November 2020, 247-258.
https://doi.org/10.18653/v1/2020.findings-emnlp.24
[26]  Aldahdooh, A., Hamidouche, W., Fezza, S.A. and Déforges, O. (2022) Adversarial Example Detection for DNN Models: A Review and Experimental Comparison. Artificial Intelligence Review, 55, 4403-4462.
https://doi.org/10.1007/s10462-021-10125-w
[27]  Bathla, G., Bhadane, K., Singh, R.K., Kumar, R., Aluvalu, R., Krishnamurthi, R., et al. (2022) Autonomous Vehicles and Intelligent Automation: Applications, Challenges, and Opportunities. Mobile Information Systems, 2022, Article 7632892.
https://doi.org/10.1155/2022/7632892
[28]  Awad, A.I., Babu, A., Barka, E. and Shuaib, K. (2024) AI-Powered Biometrics for Internet of Things Security: A Review and Future Vision. Journal of Information Security and Applications, 82, Article 103748.
https://doi.org/10.1016/j.jisa.2024.103748
[29]  Agrawal, S. (2022) Enhancing Payment Security through AI-Driven Anomaly Detection and Predictive Analytics. International Journal of Sustainable Infrastructure for Cities and Societies, 7, 1-14.
[30]  Hossain, M.T., Afrin, R. and Biswas, M.A.A. (2024) A Review on Attacks against Artificial Intelligence (AI) and Their Defence Image Recognition and Generation Machine Learning, Artificial Intelligence. Control Systems and Optimization Letters, 2, 52-59.
[31]  Habbal, A., Ali, M.K. and Abuzaraida, M.A. (2024) Artificial Intelligence Trust, Risk and Security Management (AI TRiSM): Frameworks, Applications, Challenges and Future Research Directions. Expert Systems with Applications, 240, Article 122442.
https://doi.org/10.1016/j.eswa.2023.122442
[32]  Kim, J.J.H., Um, R.S., Lee, J.W.Y. and Ajilore, O. (2024) Generative AI Can Fabricate Advanced Scientific Visualizations: Ethical Implications and Strategic Mitigation Framework. AI and Ethics.
https://doi.org/10.1007/s43681-024-00439-0
[33]  Barbierato, E. and Gatti, A. (2024) The Challenges of Machine Learning: A Critical Review. Electronics, 13, Article 416.
https://doi.org/10.3390/electronics13020416
[34]  Trilles, S., Hammad, S.S. and Iskandaryan, D. (2024) Anomaly Detection Based on Artificial Intelligence of Things: A Systematic Literature Mapping. Internet of Things, 25, Article 101063.
https://doi.org/10.1016/j.iot.2024.101063
[35]  Adelani, F.A., Okafor, E.S., Jacks, B.S. and Ajala, O.A. (2024) Theoretical Frameworks for the Role of AI and Machine Learning in Water Cybersecurity: Insights from African and U.S. Applications. Computer Science & IT Research Journal, 5, 681-692.
https://doi.org/10.51594/csitrj.v5i3.928
[36]  Cinà, A.E., Grosse, K., Demontis, A., Biggio, B., Roli, F. and Pelillo, M. (2024) Machine Learning Security against Data Poisoning: Are We There Yet? Computer, 57, 26-34.
https://doi.org/10.1109/mc.2023.3299572
[37]  Abdi, A.H., Audah, L., Salh, A., Alhartomi, M.A., Rasheed, H., Ahmed, S. and Tahir, A. (2024) Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI and MTD Approaches to Security Solutions. IEEE Access, 12, 69941-69980.
https://doi.org/10.1109/ACCESS.2024.3393548
[38]  Sontan, A.D. and Samuel, S.V. (2024) The Intersection of Artificial Intelligence and Cybersecurity: Challenges and Opportunities. World Journal of Advanced Research and Reviews, 21, 1720-1736.
https://doi.org/10.30574/wjarr.2024.21.2.0607
[39]  Zhang, Z., Hamadi, H.A., Damiani, E., Yeun, C.Y. and Taher, F. (2022) Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. IEEE Access, 10, 93104-93139.
https://doi.org/10.1109/access.2022.3204051
[40]  Shwedeh, F., Malaka, S. and Rwashdeh, B. (2023) The Moderation Effect of Artificial Intelligent Hackers on the Relationship between Cyber Security Conducts and the Sustainability of Software Protection: A Comprehensive Review. Migration Letters, 20, 1066-1072.
[41]  Enholm, I.M., Papagiannidis, E., Mikalef, P. and Krogstie, J. (2021) Artificial Intelligence and Business Value: A Literature Review. Information Systems Frontiers, 24, 1709-1734.
https://doi.org/10.1007/s10796-021-10186-w
[42]  Ahmad, K., Iqbal, W., El-Hassan, A., Qadir, J., Benhaddou, D., Ayyash, M., et al. (2024) Data-Driven Artificial Intelligence in Education: A Comprehensive Review. IEEE Transactions on Learning Technologies, 17, 12-31.
https://doi.org/10.1109/tlt.2023.3314610
[43]  Sikder, M.N.K. and Batarseh, F.A. (2023) Outlier Detection Using AI: A Survey. In: Batarseh, F.A. and Freeman, L.J., Eds., AI Assurance, Academic Press, 231-291.
https://doi.org/10.1016/B978-0-32-391919-7.00020-2
[44]  Sarker, I.H. (2022) AI-Based Modeling: Techniques, Applications and Research Issues towards Automation, Intelligent and Smart Systems. SN Computer Science, 3, Article No. 158.
https://doi.org/10.1007/s42979-022-01043-x
[45]  Lau, P.L., Nandy, M. and Chakraborty, S. (2023) Accelerating UN Sustainable Development Goals with AI-Driven Technologies: A Systematic Literature Review of Women’s Healthcare. Healthcare, 11, Article 401.
https://doi.org/10.3390/healthcare11030401
[46]  Naik, B., Mehta, A., Yagnik, H. and Shah, M. (2021) The Impacts of Artificial Intelligence Techniques in Augmentation of Cybersecurity: A Comprehensive Review. Complex & Intelligent Systems, 8, 1763-1780.
https://doi.org/10.1007/s40747-021-00494-8
[47]  Wiafe, I., Koranteng, F.N., Obeng, E.N., Assyne, N., Wiafe, A. and Gulliver, S.R. (2020) Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature. IEEE Access, 8, 146598-146612.
https://doi.org/10.1109/access.2020.3013145
[48]  Zhang, Z., Hamadi, H.A., Damiani, E., Yeun, C.Y. and Taher, F. (2022) Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. IEEE Access, 10, 93104-93139.
https://doi.org/10.1109/access.2022.3204051
[49]  Vegesna, V.V. (2023) Comprehensive Analysis of AI-Enhanced Defense Systems in Cyberspace. International Numeric Journal of Machine Learning and Robots, 7.
https://injmr.com/index.php/fewfewf/article/view/21
[50]  Sewak, M., Sahay, S.K. and Rathore, H. (2022) Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection. Information Systems Frontiers, 25, 589-611.
https://doi.org/10.1007/s10796-022-10333-x
[51]  Ansari, M.F., Dash, B., Sharma, P. and Yathiraju, N. (2022) The Impact and Limitations of Artificial Intelligence in Cybersecurity: A Literature Review. International Journal of Advanced Research in Computer and Communication Engineering, 11, 81-90.
https://doi.org/10.17148/ijarcce.2022.11912
[52]  Kapoor, P. (2023) Machine Learning for Cyber Threat Detection: Advancements and Challenges. International Journal of Machine Learning for Sustainable Development, 5.
https://ijsdcs.com/index.php/IJMLSD/article/view/420
[53]  Sinha, A.R., Singla, K. and Victor, T.M.M. (2023) Artificial Intelligence and Machine Learning for Cybersecurity Applications and Challenges. In: Kumar, R. and Pattnaik, P.K., Eds., Risk Detection and Cyber Security for the Success of Contemporary Computing, IGI Global, 109-146.
https://doi.org/10.4018/978-1-6684-9317-5.ch007
[54]  Taddeo, M., Jones, P., Abbas, R., Vogel, K. and Michael, K. (2023) Socio-Technical Ecosystem Considerations: An Emergent Research Agenda for AI in Cybersecurity. IEEE Transactions on Technology and Society, 4, 112-118.
https://doi.org/10.1109/tts.2023.3278908
[55]  Dhirani, L.L., Mukhtiar, N., Chowdhry, B.S. and Newe, T. (2023) Ethical Dilemmas and Privacy Issues in Emerging Technologies: A Review. Sensors, 23, Article 1151.
https://doi.org/10.3390/s23031151
[56]  Dwivedi, R., Dave, D., Naik, H., Singhal, S., Omer, R., Patel, P., et al. (2023) Explainable AI (XAI): Core Ideas, Techniques, and Solutions. ACM Computing Surveys, 55, Article No. 194.
https://doi.org/10.1145/3561048
[57]  Taskeen, and Garai, S. (2024) Emerging Trends in Cybersecurity: A Holistic View on Current Threats, Assessing Solutions, and Pioneering New Frontiers. Blockchain in Healthcare Today, 7, Article 302.
https://doi.org/10.30953/bhty.v7.302

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133