The possibilities of the artificial intelligence-based cyber-attacks
DOI:
https://doi.org/10.18531/Studia.Mundi.2021.08.05.25-34Keywords:
mesterséges intelligencia, kibertér, kibertámadásAbstract
The development of computers, smart devices, and the Internet has created what is known as cyberspace, which, in addition to its many benefits, can also be used by criminal, military, or political forces against people or humanity. The pinnacle of modern technology, the artificial intelligence, also holds many dangers precisely because of its potential. Our main goal is to present the cross-section of these two novel hazards. At the same time, we can get answers to questions about how we have to approach this source of danger, as a citizen, as a leader, or as an IT operator.
References
Chartis Research (2019): The State of AI in Risk Management - Chartis Research, https://www.chartis-research.com/technology/artificial-intelligence-ai/state-ai-risk-management-10976, (megtekintve 2020. 05. 08.).
Da Silva, W. (2019): War of the Bots: Artificial Intelligence in Cyber Warfare, Dialogue & Discourse, https://medium.com/discourse/spy-vs-spy-cyber-warfare-gets-automated-aba60ece738c, (megtekintve 2020. 12. 07.).
Dickson, B. (2020): Artificial intelligence can stop IoT-based DDoS attacks in their tracks – research, The Daily Swig, https://portswigger.net/daily-swig/artificial-intelligence-can-stop-iot-based-ddos-attacks-in-their-tracks-research, (megtekintve2021. 04. 17.).
Dixon, W., Farshchi J. (2019): AI is the latest weapon cybercriminals are exploiting, https://www.weforum.org/agenda/2019/09/4-ways-ai-is-changing-cybersecurity-both-in-attack-and-defense/, (megtekintve 2020. 11. 10.).
Durbin, S. (2020): How Criminals Use Artificial Intelligence To Fuel Cyber Attacks, Forbes, https://www.forbes.com/sites/forbesbusinesscouncil/2020/10/13/how-criminals-use-artificial-intelligence-to-fuel-cyber-attacks/?sh=5e4c8ac85012, (megtekintve 2020. 07. 01).
Fabók, B. (2019): Magyar céggel csaltak el tízmilliókat az első európai hanghamisításos átverésnél, G7.hu, https://g7.hu/tech/20190903/magyar-ceggel-csaltak-el-tizmilliokat-az-elso-europai-hanghamisitasos-atveresnel/, (megtekintve 2020. 06. 01.).
Fehér, A. T. (2019): Artificial intelligence in cyberspace 2 - realizing cyber attacks with AI, RED - American Journal Of Research Education And Development, Vol. 4, 27–41 o., https://online.pubhtml5.com/lwrb/eudn/, (megtekintve 2021.04.20.).
Fu, J. (2018): Security: Using AI for Evil, https://blogs.blackberry.com/en/2018/06/security-using-ai-for-evil, (megtekintve 2020. 11. 27.).
ITM (2020): Magyarország Mesterséges Intelligencia Stratégiája 2020-2030.
ITRE (2016): Industry 4.0, https://www.europarl.europa.eu/RegData/etudes/STUD/2016/570007/IPOL_STU(2016)570007_EN.pdf, (megtekintve 2020.02.14).
Kovács, L. (2018): A kibertér védelme, Budapest, Dialóg Campus, pp. 13, 25, 166-169, ISBN: 9786155889639.
McGuire, M. (2018): Into the Web of Profit, https://www.bromium.com/wp-content/uploads/2018/05/Into-the-Web-of-Profit_Bromium.pdf, (megtekintve 2020.07.20.).
Morgan, S. (2019): Official Annual Cybercrime Report, https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf, (megtekintve 2020.07.21.).
Muha, L., Krasznay C. (2018): Az elektronikus információs rendszerek biztonságának menedzselése, Budapest, Nemzeti Közszolgálati Egyetem, pp. 47-54, ISBN: 9786155870279.
Négyesi, I. (2017): A mesterséges intelligencia és a hadsereg I., Hadtudományi Szemle, X /2, http://epa.oszk.hu/02400/02463/00035/pdf/EPA02463_hadtudomanyi_szemle_2017_2_023-034.pdf, (megtekintve 2020.02.20).
Niessner, M. (2016): Face2Face: Real-time Face Capture and Reenactment of RGB Videos, https://www.youtube.com/watch?v=ohmajJTcpNk, (megtekintve 2021. 02. 10.).
Ph. Stoecklin, M. - Jiyong J. - Kirat D. (2018): DeepLocker: How AI Can Power a Stealthy New Breed of Malware, https://securityintelligence.com/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware/, (megtekintve 2020. 11.27.).
Porter, J. (2019): Another convincing deepfake app goes viral prompting immediate privacy backlash, The Verge, https://www.theverge.com/2019/9/2/20844338/zao-deepfake-app-movie-tv-show-face-replace-privacy-policy-concerns, (megtekintve 2020. 11. 27.).
Rodriguez, M. (2019): Creating an AI Red Team to Protect Critical Infrastructure, https://www.mitre.org/publications/project-stories/creating-an-ai-red-team-to-protect-critical-infrastructure, (megtekintve 2020.11.20.).
Tech Wire Asia (2020): Industry 4.0 and cyber attacks: the AI-powered answer, https://techwireasia.com/2020/08/ai-ml-cybersecurity-cyber-defense-artificial-intelligence-apac-defence/, (megtekintve 2020. 12. 17.).
Thies, J., et al. (2016): Face2Face: Real-Time Face Capture and Reenactment of RGB Videos. Las Vegas, IEEE, 9 p., doi:10.1109/CVPR.2016.262.
Tran, D. (2017): Face2face — A Pix2Pix demo that mimics the facial expression of the German chancellor, Towards Data Science, https://towardsdatascience.com/face2face-a-pix2pix-demo-that-mimics-the-facial-expression-of-the-german-chancellor-b6771d65bf66, (megtekintve 2020. 11. 19.).
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Fehér Tibor András, Négyesi Imre
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
A folyóirat Open Access (Gold). Cikkeire a Creative Commons 4.0 standard licenc alábbi típusa vonatkozik: CC-BY-NC-ND-4.0. Ennek értelmében a mű szabadon másolható, terjeszthető, bemutatható és előadható, azonban nem használható fel kereskedelmi célokra (NC), továbbá nem módosítható és nem készíthető belőle átdolgozás, származékos mű (ND). A licenc alapján a szerző vagy a jogosult által meghatározott módon fel kell tüntetni a szerző nevét és a szerzői mű címét (BY).