23UWSLEL012 - 20200401016 - Prerna Bhansali
23UWSLEL012 - 20200401016 - Prerna Bhansali
23UWSLEL012 - 20200401016 - Prerna Bhansali
RESEARCH PAPER
ON
Table of Content
Table of Content.....................................................................................................................................2
Abstract...................................................................................................................................................3
Introduction............................................................................................................................................4
Clarifying Key Concepts: Cybersecurity and AI................................................................................5
Deciphering Cybersecurity: Safeguarding Information and Assets.............................................5
Uncomplicating Artificial Intelligence: A Basic Insight.................................................................6
Empowering Cybersecurity Through Artificial Intelligence.............................................................6
Exploring the AI Agent Paradigm: Collaborative Intelligence in Action....................................7
Brain-Inspired Learning of Artificial Neural Networks (ANNs)..................................................7
Immune-Based Techniques in Cybersecurity.................................................................................8
Expert Systems in AI Applications...................................................................................................8
Leveraging AI Advantages in Cybersecurity......................................................................................9
AI Drawbacks in Cybersecurity.........................................................................................................10
New Frontiers of Cyber-Attacks on AI Systems...............................................................................11
The Ethical Quandaries of AI in Cybersecurity...............................................................................11
Conclusion............................................................................................................................................12
3
Abstract
In the face of escalating cyber threats, cybersecurity has become a paramount societal
challenge, necessitating innovative solutions beyond traditional approaches. This paper
delves into the convergence of artificial intelligence (AI) and cybersecurity as a
transformative defense mechanism against evolving cyber-attacks. As conventional
cybersecurity methods prove inadequate, the integration of AI brings forth a powerful and
adaptive safeguard. However, this symbiotic relationship introduces ethical challenges, as the
very technology designed to fortify against cybercrimes may be manipulated by malicious
actors. The paper explores recent AI techniques implemented in cybersecurity while shedding
light on the ethical dilemmas intrinsic to this amalgamation. By dissecting the ethical
challenges associated with the intersection of AI and cybersecurity, the research aims to
contribute to a comprehensive understanding of the intricate dynamics and implications of
this critical paradigm shift in the realm of digital security.
Introduction
In recent times, there has been a growing focus on the development and application of
artificial intelligence (AI) and machine learning (ML). These technologies are being actively
explored across various industries,1 showcasing the unprecedented growth of AI research
driven by the global quest for technological solutions to society's most urgent issues.2
One such concern, highlighted in the 2019 Global Risks Report by the World Economic
Forum, positions cyber-attacks among the top five global risks with severe consequences.
This aligns with multiple analyses indicating a surge in the frequency and impact of cyber
threats. For instance, the first half of 2018 witnessed cyber-attacks compromising 3.3 billion
records, a significant increase of nearly 70% compared to the entirety of 2017 (2.7 billion).
These attacks are not only intensifying but also evolving rapidly. A Microsoft study reveals
that 60% of 2018's cyber-attacks lasted less than an hour, employing innovative forms of
malware.3
The financial toll of cybercrime is also on the rise, projected to double from US$3 trillion in
2015 to US$6 trillion in 2021 and reaching an estimated US$10.5 trillion by 2025. The
average cost of a single data breach soared to US$4.24 million in 2021, marking a 10%
increase from 2019. Ransomware claims alone have surged by 150% since 2018, according
to insurer AIG.
In response to this global challenge, both public and private entities, including corporations
and governments, are actively pursuing measures to safeguard their data and information.
Strategies include pseudonymization of data, data backup, and data encryption. The
integration of AI in cybersecurity aims to enhance prevention, identification, and resolution
of cyber-attacks, along with identifying vulnerabilities with minimal human intervention.
While AI adoption in cybersecurity is still in its early stages, the global market is anticipated
1
National Academies of Sciences, Engineering and Medicine, Implications of Artificial Intelligence for
Cybersecurity: Proceedings of a Workshop (The National Academies Press, Washington, DC 2019). Retrieved
from https://nap.nationalacademies.org/catalog/25488/implications-of-artificial-intelligence-for-cybersecurity-
proceedings-of-a-workshop. Published in 2019.
2
Brandon W Jackson. Minnesota Journal of Law. ‘Cybersecurity, Privacy, and Artificial Intelligence: An
Examination of Legal Issues Surrounding the European Union General Data Protection Regulation and
Autonomous Network Defense;’ Volume 21, Issue 1. Retrieved from
https://scholarship.law.umn.edu/cgi/viewcontent.cgi?article=1476&context=mjlst. Published on 6 June, 2020.
3
Mariarosaria Taddeo, Tom McCutcheon, and Luciano Floridi. Nature Machine Intelligence. Trusting artificial
intelligence in cybersecurity is a double-edged sword; volume 1, pages-557–560. Retrieved from
https://doi.org/10.1038/s42256-019-0109-1. Published on 11 November, 2019.
5
4
Ed Bowen, Wendy Frank, Deborah Golden, Michael Morris and Kieran Norton. Deloitte. ‘Cyber AI: Real
defense’. Retrieved from https://www2.deloitte.com/us/en/insights/focus/tech-trends/2022/future-of-
cybersecurity-and-ai.html. Published on 7 December, 2021.
5
Bernd Stahl, Moira Carroll-Mayer, David Elizondo, Kutoma Wakunuma and Yingqin Zheng. SpringerLink.
‘Intelligence Techniques in Computer Security and Forensics: At the Boundaries of Ethics and Law’ in David A
Elizondo, Agusti Solanas and Antoni Martınez-Balleste (eds), Computational Intelligence for Privacy and
Security. Retrieved from https://link.springer.com/chapter/10.1007/978-3-642-25237-2_14. Published on 1
January, 2012.
6
Daniel Schatz, Rabih Bashroush and Julie Wall. The Journal of Digital Forensics, Security and Law. ‘Towards
a More Representative Definition of Cyber Security;’ Volume 12, Number 2. Retrieved from
https://commons.erau.edu/cgi/viewcontent.cgi?article=1476&context=jdfsl. Published on 30 June, 2017.
6
solution with the potential to intelligently analyze and categorize substantial volumes of
Internet traffic.8 Academic resources highlight the diverse applications of AI techniques in
countering cyber-attacks, with neural networks playing a pivotal role in intrusion detection
and prevention. Beyond this, proposals extend to leveraging neural networks for tasks such as
Denial-of-Service detection, computer worm detection, spam detection, zombie detection,
malware classification, and forensic investigations.
Various AI techniques, including Heuristics, Data Mining, Neural Networks, and Artificial
Immune Systems, find application in advancing next-generation anti-virus technology.
Intelligent agent technology, at times coupled with mobile agent technology, is employed in
some intrusion detection and prevention systems.9 This section provides a concise overview
of existing applications where AI techniques contribute significantly to enhancing
cybersecurity, offering a glimpse into the evolving landscape of AI's role in fortifying digital
defenses.
Given their decentralized and interactive nature, intelligent agents inherently lend themselves
8
Sherali Zeadally, Erwin Adi, Zubair Baig, and Imran A. Khan. IEEE. ‘Harnessing Artificial Intelligence
Capabilities to Improve Cybersecurity’. Retrieved from https://ieeexplore.ieee.org/abstract/document/8963730.
Published on 20 January, 2020.
9
Selma Dilek, Hüseyin Cakır and Mustafa Aydın. ‘Applications of Artificial Intelligence Techniques to
Combating Cyber Crimes: A Review’ (2015) International Journal of Artificial Intelligence & Applications;
Vol. 6, No. 1. Retrieved from https://arxiv.org/ftp/arxiv/papers/1502/1502.03552.pdf. Published on January
2015.
10
Nadine Wirkuttis and Hadas Klein, ‘Artificial Intelligence in Cybersecurity;’ 01 Cyber, Intelligence,
and Security; Volume 1. Retrieved from
https://www.academia.edu/36264684/Artificial_Intelligence_in_Cybersecurity. Published in January 2017.
8
ANN techniques showcase remarkable proficiency in discerning patterns within data samples
ranging from noisy to incomplete. This adaptability makes them particularly suitable for
intrusion-detection systems, where they can adjust to novel forms of communication. In a
cybersecurity context, a notable application involves the Cascade Correlation Neural
Network (CCNN), which incrementally introduces new hidden units to the hidden layer as
needed. When new events are detected, the network dynamically incorporates these new
hidden nodes, training them exclusively with the freshly collected data. This results in a
runtime adaptive and scalable system. Another significant advantage of ANNs lies in their
ability to detect zero-day attacks by learning from recent incidents, showcasing their agility
and responsiveness in the ever-evolving landscape of cybersecurity.
the concentration of antibodies. This approach, reflective of the immune system's defense
mechanisms, holds significant importance in the realm of cybersecurity, serving as a crucial
defense mechanism against cybercrimes. The implementation of Artificial Immune Systems
(AISs) contributes to the fortification of cyber defenses, aligning with the intricate and
adaptive nature of natural immune systems to safeguard digital environments from potential
threats.11
One notable approach within expert systems is Case-Based Reasoning (CBR), allowing
problem resolution by recalling similar cases from the past. This method assumes that
solutions from prior cases can be adapted and applied to new problem instances. Continual
improvements occur as newly proposed solutions are evaluated and, if necessary, revised
over time, enhancing accuracy and the system's ability to learn. Rule-Based Systems (RBS)
form another facet, solving problems using rules defined by experts, encompassing a
condition and an associated action. Unlike CBR systems, RBSs lack the capacity to
autonomously learn new rules or modify existing ones, leading to the "knowledge acquisition
problem," particularly significant in dynamic environments. In the realm of cybersecurity,
expert systems find widespread use among security professionals, offering invaluable
decision support in navigating complex cyber environments.
11
Zeeshan Siddiqui, Sonali Yadav and Mohd Shahid Husain. ‘Application of Artificial Intelligence in Fighting
against Cyber Crimes: A Review;’ 9 International Journal of Advanced Research in Computer Science
118. Retrieved from file:///C:/Users/Admin/Downloads/aceit18.pdf. Published in April, 2018.
10
range of advantages to combat the ever-evolving landscape of cyber threats. The dynamic
nature of cyberattacks and the proliferation of devices necessitate a response that AI can
provide more effectively than traditional cybersecurity methods. Here are several key
advantages of applying AI in the realm of preventing cyber threats:
1. Large Data Processing: AI enables organizations to process vast amounts of data with
precision and efficiency.12 The ability to scan extensive data sets and utilize Machine
Learning (ML) algorithms to discern patterns empowers AI to guide human decision-
makers on effective response strategies. The speed and scale at which AI software
accomplishes data analysis tasks surpass the capabilities of human security experts.13
2. Early Detection of New Risks: Traditional software struggles to keep pace with the
volume of new malware created by attackers.14 AI-powered cybersecurity solutions
excel in identifying both novel, unknown threats and known threats that have
breached networks. This capability plays a crucial role in mitigating advanced
hacking techniques employed by attackers.15
3. Fast Response: AI significantly reduces the time taken to detect threats and breaches,
enhancing overall cybersecurity. The use of AI can cut down the time for remediation
and patch implementation by up to 12%. Some organizations achieve even greater
reductions, exceeding 15%, contributing to a more agile response to cyber threats.
4. Higher Accuracy: AI-based cybersecurity data analysis consistently outperforms
human analysts in accuracy, especially in large-scale data analysis and anomaly
detection. AI excels in reducing errors and faults in operational tasks, showcasing its
efficiency in finding anomalies and irregularities.
5. Cost Reduction: AI-driven cybersecurity systems comprehend and reuse threat
patterns, leading to a reduction in the time and effort required to identify, investigate,
12
Ljubomir Lazic. ‘Benefit From AI in Cybersecurity;’ The 11th International Conference on Business
Information Security, Belgrade, Serbia. Retrieved from
file:///C:/Users/Admin/Downloads/Prof.Lazicpaper_BISEC2019Ver.2.pdf. Published in Oct, 2019.
13
Watney, M M. Artificial Intelligence and its' Legal Risk to Cybersecurity; Originally published in
Proceedings of the 19th European conference on cyber warfare and security (Academic Conferences and
publishing International limited, UK 2020). Retrieved from
https://www.proquest.com/openview/ce8ef72f9d9548ffeb1dcf2e667eba03/1?pq-
origsite=gscholar&cbl=396497#:~:text=AI%2Ddriven%20cybersecurity%20technology%20must,should%20be
%20applied%20to%20cybersecurity. Published in June 2020.
14
Gaurav Belani. The Use of Artificial Intelligence in Cybersecurity: A Review. Retrieved from
https://www.computer.org/publications/tech-news/trends/the-use-of-artificial-intelligence-in-cybersecurity
Published on 01/16/2021.
15
Kashyap Vyas. IT Business Edge. ‘The Pros and Cons of Enlisting AI for Cybersecurity’. Retrieved from
https://www.itbusinessedge.com/security/the-pros-and-cons-of-enlisting-ai-for-cybersecurity/. Published on 22
October 2021.
11
and remediate threats. A majority of executives report that AI lowers the cost of
detecting and responding to breaches, with reductions ranging from 1% to 15%, and
some organizations achieving even higher cost reductions.
6. Filling Employment Gap: The shortage of cybersecurity talent worldwide is
exacerbated by the escalating severity and complexity of cyber threats. AI plays a
pivotal role in filling this employment gap, offering a strategic solution to the chronic
shortage by automating certain tasks and augmenting the capabilities of existing
cybersecurity professionals.
AI Drawbacks in Cybersecurity
Despite the promising advancements in AI for cybersecurity, certain drawbacks need
consideration:
16
Sagar Samtani, Murat Kantarcioglu and Hsinchun Chen. Trailblazing the Artificial Intelligence for
Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap (Volume 11; Issue 4; Article No.: 17; pp 1–
19). Retrieved from https://dl.acm.org/doi/pdf/10.1145/3430360. Published on 2 December 2020.
17
Ibid.
12
While AI holds great potential in fortifying cybersecurity, addressing these drawbacks is vital
to ensure effective, transparent, and collaborative cyber defense strategies.
1. Data Poisoning: Attackers inject carefully crafted erroneous data into the legitimate
training data, altering the behavior of the AI system.
2. Tempering of Categorization Models: By manipulating the categorization models of
neural networks, attackers can deceive AI systems into misclassifying objects, as
demonstrated by the manipulation of 3D-printed turtle images, causing an AI system
to misclassify turtles as rifles.
3. Backdoor-Based Attacks: These attacks rely on hidden triggers added to the AI
model, overriding correct classifications and making the system perform
unexpectedly. For instance, a study added images of stop signs with a special sticker
to the training set, causing an AI system to classify any stop sign with that sticker as a
speed limit sign, posing significant safety risks for autonomous vehicles.
Data Privacy Concerns: AI, particularly advanced techniques like Artificial Neural
Networks (ANNs), poses challenges to data privacy. The extensive analysis of data,
including files, emails, and user behavior, for threat detection can lead to privacy
concerns. The continuous monitoring required for enhancing system resilience raises
questions about user privacy, exposes them to additional risks in case of data
breaches, and may contribute to a mass surveillance effect.18
18
Mariarosaria Taddeo, ‘Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity’
13
Addressing these ethical challenges requires a thoughtful and responsible approach to the
development, deployment, and use of AI technologies in cybersecurity, ensuring
transparency, fairness, and adherence to ethical principles.
Conclusion
As the integration of AI systems in cybersecurity accelerates, it is imperative to subject them
to ethical scrutiny to mitigate risks such as deskilling and unwarranted surveillance that may
arise from uncontrolled behavior. Faced with potential risks, society may contemplate
rejecting the application of AI techniques in cybersecurity, despite their capacity to enhance
data system security. However, limited adoption could render cyber defense more vulnerable,
providing malicious users an advantage in crafting novel attacks that exploit the absence of
robust AI defenses.
The initial crucial step involves designing and deploying AI in strict adherence to ethical
standards, ensuring responsible and accountable behavior. The establishment of AI
regulations becomes paramount to uphold ethical norms and safeguard individual rights.
Moreover, through collaborative efforts spanning civil society, politics, business, and
academia, coordinated strategies can be identified and pursued. This collaborative approach
aims to harness the potential of AI as a force for human flourishing while upholding the
fundamental principle of respecting human dignity. By navigating these ethical pathways, AI
in cybersecurity can evolve into a beneficial and protective force that aligns with the well-
being of individuals and society at large.