Securing AI: A Survey Addressing Cyber Threats Arising in Cyber Security due to Artificial Intelligence

Year : 2024 | Volume :15 | Issue : 02 | Page : –
By

S. Megha,

Prasannakumaran K. S.,

  1. Student Department of Computer Science and Engineering, College of engineering of Kallooppara, APJ Abdul Kalam Technological University Kerala India
  2. Assistant professor Department of Computer Science and Engineering, College of engineering of Kallooppara, APJ Abdul Kalam Technological University Kerala India

Abstract

In today’s ever-evolving technological landscape, the integration of Artificial Intelligence (AI) across various industries underscores the critical need for a robust cybersecurity framework. This comprehensive survey paper delves into the pressing necessity of safeguarding AI systems against cyber threats. Recent incidents have highlighted the alarming susceptibility of AI to malicious attacks, showcasing the potential repercussions of compromised systems. These attacks range from data manipulation to privacy infringements, posing significant risks to both individuals and organizations. This paper delves into the intricate cybersecurity challenges facing AI, shedding light on common threats and their far-reaching consequences. Additionally, exploring the potential of AI itself to bolster cybersecurity measures, offering hope in the fight against malicious activities. By emphasizing the imperative of prioritizing cybersecurity in AI development and deployment, underscoring the importance of proactive measures to mitigate risks effectively. Ultimately, by acknowledging the dynamic nature of cyber threats and implementing robust defense mechanisms which can ensure the responsible and secure integration of AI into our society, safeguarding both technological advancements and user trust.

Keywords: Cybersecurity, Artificial Intelligence, Cyber Crime

[This article belongs to Journal of Computer Technology & Applications(jocta)]

How to cite this article: S. Megha, Prasannakumaran K. S.. Securing AI: A Survey Addressing Cyber Threats Arising in Cyber Security due to Artificial Intelligence. Journal of Computer Technology & Applications. 2024; 15(02):-.
How to cite this URL: S. Megha, Prasannakumaran K. S.. Securing AI: A Survey Addressing Cyber Threats Arising in Cyber Security due to Artificial Intelligence. Journal of Computer Technology & Applications. 2024; 15(02):-. Available from: https://journals.stmjournals.com/jocta/article=2024/view=158266



References

  1. Naomi Haefner, Joakim Wincent, Vinit Parida, Oliver Gassmann, Artificial intelligence and innovation management: A review, framework, and research agenda✰, Technological Forecasting and Social Change, Volume 162, 2021, 120392, ISSN 0040-1625, https://doi.org/10.1016/j.techfore.2020.120392.
  2. Mahind, Rupali & Amit, Patil. (2017). A Review Paper on General Concepts of “Artificial Intelligence and Machine Learning”. IARJSET. 4. 79-82. 10.17148/IARJSET/NCIARCSE.2017.22.
  3. Global Risks Report 2023 | World Economic Forum. 2023. Available from: https://www.weforum.org/publications/global-risks-report-2023/ ‌
  4. Kumar PA, Selvakumar S. Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Computer Communications. 2013 Feb 1;36(3):303-19.
  5. Wang, W., et al. (2019). Attention-based LSTM for anomaly detection in honeypots. IEEE Transactions on Industrial Informatics, 15(10), 5832-5841. (https://arxiv.org/abs/2107.05561)
  6. Shaukat Dar, Kamran & Luo, Suhuai & Varadharajan, Vijay & Hameed, Ibrahim & Xu, Min. (2020). A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access. 10.1109/ACCESS.2020.3041951.
  7. Alabadi M, Celik Y. Anomaly detection for cyber-security based on convolution neural network: A survey. In2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2020 Jun 26 (pp. 1-14). IEEE.
  8. Chakraborty S, Krishna R, Ding Y, Ray B. Deep learning based vulnerability detection: Are we there yet?. IEEE Transactions on Software Engineering. 2021 Jun 8;48(9):3280-96.
  9. Alani MM. Big data in cybersecurity: a survey of applications and future trends. Journal of Reliable Intelligent Environments. 2021 Jun;7(2):85-114.
  10. Strelkova, O., 2017. Three types of artificial intelligence. https://www.ibm.com/blog/understanding-the-different-types-of-artificial-intelligence/
  11. Mohri M, Rostamizadeh A, Talwalkar A. Foundations of machine learning. MIT press; 2018 Dec 25.
  12. Biggio, B., Nelson, B. and Laskov, P., 2012. Poisoning attacks against support vector machines. arXiv preprint arXiv:1206.6389.
  13. Pulido-Gaytan LB, Tchernykh A, Cortés-Mendoza JM, Babenko M, Radchenko G. A survey on privacy-preserving machine learning with fully homomorphic encryption. InLatin American High Performance Computing Conference 2020 Sep 2 (pp. 115-129). Cham: Springer International Publishing.
  14. Mewa T. ‘Man is to Computer Programmer as Woman is to Homemaker? Debiasing Word Embeddings’ by Tolga Bolukbasi, Kai-Wei Chang, James Zou, Venkatesh Saligrama, & Adam Kalai (2016). Identifying Gender and Sexuality of Data Subjects. 2020 May 30.
  15. Chang CL, Hung JL, Tien CW, Tien CW, Kuo SY. Evaluating robustness of ai models against adversarial attacks. InProceedings of the 1st ACM Workshop on Security and Privacy on Artificial Intelligence 2020 Oct 6 (pp. 47-54).
  16. Goodfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572. 2014 Dec 20.
  17. Lundberg SM, Lee SI. A unified approach to interpreting model predictions. Advances in neural information processing systems. 2017;30.
  18. Frey CB, Osborne MA. The future of employment: How susceptible are jobs to computerisation?. Technological forecasting and social change. 2017 Jan 1;114:254-80.
  19. Si, Zihua & Han, Xueran & Zhang, Xiao & Xu, Jun & Yin, Yue & Song, Yang & Wen, Ji-Rong. (2022). A Model-Agnostic Causal Learning Framework for Recommendation using Search Data. 224-233. 10.1145/3485447.3511951.
  20. Das, A. and Rad, P., 2020. Opportunities and challenges in explainable artificial intelligence (xai): A survey. arXiv preprint arXiv:2006.11371.
  21. Biggio, Battista & Roli, Fabio. (2017). Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning. Pattern Recognition. 84. 10.1016/j.patcog.2018.07.023.
  22. Wirkuttis N, Klein H. Artificial intelligence in cybersecurity. Cyber, Intelligence, and Security. 2017 Jan;1(1):103-19.
  23. Mauri L, Damiani E. Modeling threats to AI-ML systems using STRIDE. Sensors. 2022 Sep 3;22(17):6662.
  24. Fahim Sufi,A global cyber-threat intelligence system with artificial intelligence and convolutional neural network, Decision Analytics Journal,Volume 9, 2023, 100364, ISSN 2772-6622, https://doi.org/10.1016/j.dajour.2023.100364.
  25. Biggio, B. and Roli, F., 2018, October. Wild patterns: Ten years after the rise of adversarial machine learning. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 2154-2156).
  26. Gartner 2023 Magic Quadrant for SD-WAN. Paloaltonetworks.com. 2023. Available from: https://start.paloaltonetworks.com/gartner-sd-wan-mq-2023.html?utm_source=google-jg-japac-sase-smco-wanm&utm_medium=paid_search&utm_campaign=google-sase-sdwan-japac-in-lead_gen-en&utm_content=7014u0000017kvYAAQ&utm_term=palo%20alto%20sd%20wan&cq_plac=&cq_net=g&gad_source=1&gclid=CjwKCAjw4ri0BhAvEiwA8oo6FwnXcA8IKwZ4fcrq9EZaNPkotkeIqAlzFHQ6Fgzo8URJUTN0lMnD9BoC0uQQAvD_BwE
  27. The Evolution of ZTNA to Fully Support Zero Trust Strategies. Paloaltonetworks.com. 2021. Available from: https://start.paloaltonetworks.com/the-evolution-of-ZTNA?utm_source=google-jg-japac-sase-smco-syhw&utm_medium=paid_search&utm_campaign=google-sase-shw-japac-in-lead_gen-en-eg-brand&utm_content=7014u000001kapoAAA&utm_term=palo%20alto%20prisma&cq_plac=&cq_net=g&gad_source=1&gclid=CjwKCAjw4ri0BhAvEiwA8oo6FwLI9YHHidDx5VYblO0FM-owIM160JSapeigKqJmkvgQQ4F-1eceoxoCev4QAvD_BwE
  28. Principles and approaches for secure by design software. Available from: https://www.cisa.gov/sites/default/files/2023-10/SecureByDesign_1025_508c.pdf

Regular Issue Subscription Review Article
Volume 15
Issue 02
Received June 26, 2024
Accepted July 10, 2024
Published July 26, 2024