ARTIFICIAL INTELLIGENCE: CYBERSECURITY OF THE NEW GENERATION

Authors

DOI:

https://doi.org/10.18372/2225-5036.30.19235

Keywords:

Artificial Intelligence (AI), cybersecurity, cyber threats, machine learning, deep learning, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Deception technologies, SIEM systems, UEBA systems, code analysis, sandboxes, malicious use of AI, digital transformation, Internet of Things (IoT)

Abstract

The article discusses the role of artificial intelligence in shaping the cybersecurity of the new generation. With the rise of cyber threats and the sophistication of attackers' methods, traditional defense mechanisms become insufficiently effective. AI offers innovative solutions to counter these challenges by its ability to analyze large volumes of data, detect anomalies, and predict the behavior of attackers. Various applications of AI for data protection are considered, including: early detection of cyber threats; data analysis from various sources to identify potential threats; predicting the likelihood of cyber attacks; developing intelligent access control systems; automating responses to cyber incidents; and improving encryption algorithms. New cyber attack methods used by hackers are also revealed, such as data poisoning, generating malicious software using generative adversarial networks (GANs), creating fake content and deepfakes, IoT device attacks, and using AI to enhance social engineering effectiveness. Additionally, methods for analyzing code vulnerabilities using AI, including static code analysis (SAST) and dynamic code analysis (DAST), as well as the use of sandboxes for secure code testing, are discussed. Special attention is paid to the capabilities and risks associated with the "dark side" of AI, such as FraudGPT, WormGPT, and Evil-GPT, which are used by cybercriminals to carry out cyber attacks. Emphasis is placed on the need for a comprehensive approach to cybersecurity, combining the power of AI algorithms with expert knowledge, user education, and international cooperation. Further research and development in this field are critically important for ensuring the security of the digital world in the face of constantly growing cyber threats. To provide a solid research foundation, a comprehensive study of scientific literature and relevant publications dedicated to the role of artificial intelligence in modern cybersecurity was conducted.

 

References

Shutenko V. (2023, September 13). AI in Cybersecurity: Exploring the Top 6 Use Cases.

https://www.techmagic.co/blog/ai-in-cybersecurity/

Jansasoy J. (2023, July 24). 10 IoT Security Challenges and Solutions To Protect Your Devices.

https://www.linkedin.com/pulse/10-iot-security-challenges-solutions-protect-your-2023-jansasoy-/

Roytman M. (2024, March 5). The Future Of AI And ML In Cybersecurity.

https://www.forbes.com/sites/forbestechcouncil/2024/03/05/the-future-of-ai-and-ml-in-cybersecurity/

Rjoub G., Bentahar J., Abdel Wahab O., Mizouni R., Song A., Cohen R., Otrok H., Mourad A. (2023). A Survey on Explainable Artificial Intelligence for Cybersecurity.

https://arxiv.org/pdf/2303.12942.pdf

Thwaini Mohammed. (2022). Anomaly Detection in Network Traffic using Machine Learning for Early Threat Detection.

https://dm.saludcyt.ar/index.php/dm/article/view/72/

Bisceglia N. (2023, October 22). ChatGPT and Cybersecurity: Risks, Potential Benefits & More.

https://teampassword.com/blog/chatgpt-and-cybersecurity/

Brundage M., Avin S., Clark J., Toner H., Eckersley P., Garfinkel B., ... & Amodei D. (2018) The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation.

https://arxiv.org/ftp/arxiv/papers/1802/1802.07228.pdf

Binns R. (2024, March 29). AI Names 2024’s Biggest Cybersecurity Threats – and AI is One of Them.

https://www.techopedia.com/ai-names-biggest-cybersecurity-threats

National Institute of Standards and Technology (NIST). (2024, February 26). The NIST Cybersecurity Framework (CSF) 2.0 [NIST Cybersecurity White Paper (CSWP) NIST CSWP 29]. https://doi.org/10.6028/NIST.CSWP.29

International Telecommunication Union (ITU). AI for Good Global Summit. https://aiforgood.itu.int/

OpenAI Blog. https://openai.com/blog

Hu W., Tan Y. A. (2020). Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN.

https://arxiv.org/pdf/1702.05983.pdf

Rosenberg I., Shabtai A., Rokach L., Elovici Y. (2018). Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.https://arxiv.org/pdf/1707.05970.pdf

Cloudflare. (2023, October 26). The phishing implications of AI chatbots.https://www.cloudflare.com/the-net/chatgpt-phishing/

Stoecklin M. P. (2018, August 8). DeepLocker: How AI Can Power a Stealthy New Breed of Malware.https://securityintelligence.com/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware/

Maurel H., Vidal S., Rezk, T. (2021). Statically identifying XSS using deep learning. https://inria.hal.science/hal-03273564/document

Lodeiro-Santiago M., Caballero-Gil C., Caballero-Gil P. (2022). Collaborative SQL-injections detection system with machine learning. https://arxiv.org/pdf/2209.06553.pdf

Allamanis M., Barr E. T., Devanbu P., Sutton C. (2018). A survey of machine learning for big code and naturalness. https://arxiv.org/pdf/1709.06182.pdf

David O. E., Netanyahu N. S. (2015). DeepSign: Deep learning for automatic malware signature generation and classification. https://arxiv.org/pdf/1711.08336.pdf

Zhang J. M., Harman M., Ma L., Liu Y. (2019, May). Machine learning testing: Survey, landscapes and horizons.

https://arxiv.org/pdf/1906.10742.pdf

Hassan A. (2023, May 16). Top Sandbox Environments Using AI. https://www.linkedin.com/pulse/top-sandbox-environments-using-ai-ahmed-hassan

Amos Z. (2023, August 11). What Is FraudGPT?

https://hackernoon.com/what-is-fraudgpt

Berezovskyi D. (2023, March 15). DAN у GPT-4: як обійти модерацію вмісту. https://chatgpt.com.ua/post/dan-gpt-4-hacking-and-jailbreaking

coolaj86. Chat GPT "DAN" (and other "Jailbreaks").https://gist.github.com/coolaj86/6f4f7b30129b0251f61fa7baaa881516

Lukatsky A. (2023, September 7). FraudGPT, DarkGPT, WormGPT, Evil-GPT и другие джепеты.https://www.securitylab.ru/blog/personal/Business_without_danger/353102.php

Buckley O., Nurse J. R. C. (2024, February 8). Cybercriminals are creating their own AI chatbots to support hacking and scam users. https://theconversation.com/cybercriminals-are-creating-their-own-ai-chatbots-to-support-hacking-and-scam-users-222643

WormGPT. https://wormgpt.com.co/

Dutta T. S. (2023, August 10). Hackers Released New Black Hat AI Tool Evil-GPT as a Replacement for Worm GPT. https://cybersecuritynews.com/hackers-released-evil-gpt/

A10 Networks. How a bot herder attacks [Image]. https://www.a10networks.com/wp-content/uploads/how-a-bot-herder-attacks.png

Published

2024-12-03

Issue

Section

Cybersecurity & Critical Information Infrastructure Protection (CIIP)