Vis enkel innførsel

dc.contributor.authorKaloudi, Nektaria
dc.contributor.authorLi, Jingyue
dc.date.accessioned2020-02-19T11:38:31Z
dc.date.available2020-02-19T11:38:31Z
dc.date.created2020-02-17T17:44:12Z
dc.date.issued2020
dc.identifier.issn0360-0300
dc.identifier.urihttp://hdl.handle.net/11250/2642553
dc.description.abstractRecent advancements in artificial intelligence (AI) technologies have induced tremendous growth in innovation and automation. Although these AI technologies offer significant benefits, they can be used maliciously. Highly targeted and evasive attacks in benign carrier applications, such as DeepLocker, have demonstrated the intentional use of AI for harmful purposes. Threat actors are constantly changing and improving their attack strategy with particular emphasis on the application of AI-driven techniques in the attack process, called AI-based cyber attack, which can be used in conjunction with conventional attack techniques to cause greater damage. Despite several studies on AI and security, researchers have not summarized AI-based cyber attacks enough to be able to understand the adversary’s actions and to develop proper defenses against such attacks. This study aims to explore existing studies of AI-based cyber attacks and to map them onto a proposed framework, providing insight into new threats. Our framework includes the classification of several aspects of malicious uses of AI during the cyber attack life cycle and provides a basis for their detection to predict future threats. We also explain how to apply this framework to analyze AI-based cyber attacks in a hypothetical scenario of a critical smart grid infrastructure.nb_NO
dc.language.isoengnb_NO
dc.publisherAssociation for Computing Machinery (ACM)nb_NO
dc.titleThe AI-Based Cyber Threat Landscape: A Surveynb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.volume53nb_NO
dc.source.journalACM Computing Surveysnb_NO
dc.identifier.doihttps://doi.org/10.1145/3372823
dc.identifier.cristin1795000
dc.description.localcode© ACM, 2020. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published here, http://dx.doi.org/https://doi.org/10.1145/3372823nb_NO
cristin.unitcode194,63,10,0
cristin.unitnameInstitutt for datateknologi og informatikk
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode2


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel