Resumen
Cybersecurity has benefitted from Artificial Intelligence (AI) technologies for attack detection. However, recent advances in AI techniques, in tandem with their misuse, have outpaced parallel advancements in cyberattack classification methods that have been achieved through academic and industry-led efforts. We describe the shift in the evolution of AI techniques, and we show how recent AI approaches are effective in helping an adversary attain his/her objectives appertaining to cyberattacks. We also discuss how the current architecture of computer communications enables the development of AI-based adversarial threats against heterogeneous computing platforms and infrastructures.
| Idioma original | English |
|---|---|
| Publicación | Applied Cybersecurity and Internet Governance |
| Volumen | 1 |
| N.º | 1 |
| DOI | |
| Estado | Published - 2022 |
Nota bibliográfica
Publisher Copyright:© Erwin Adi, Zubair Baig, Sherali Zeadally, Publisher NASK. Publishing House by Index Copernicus Sp. z. o.
Financiación
We thank the anonymous reviewers for their valuable comments of assistance to us in improving the content, organisation, and presentation of this paper. Sherali Zeadally was supported by a Fulbright U.S. Scholar Grant ?ward administered by the U.S. Department of State’s Bureau of Educational and Cultural ?ffairs, and through its cooperating agency the Institute of International Education (“IIE”). We thank the anonymous reviewers for their valuable comments of assistance to us in improving the content, organisation, and presentation of this paper. Sherali Zeadally was supported by a Fulbright U.S. Scholar Grant Award administered by the U.S. Department of State’s Bureau of Educational and Cultural Affairs, and through its cooperating agency the Institute of International Education (“IIE”).
| Financiadores |
|---|
| Fulbright U.S. Scholar |
| U.S. Department of State Bureau of Educational and Cultural Affairs |
| Institute of International Education |
ASJC Scopus subject areas
- Computer Science (miscellaneous)
- Psychology (miscellaneous)
- Human-Computer Interaction
- Political Science and International Relations
Huella
Profundice en los temas de investigación de 'Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions'. En conjunto forman una huella única.Citar esto
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver