The possibilities of the artificial intelligence-based cyber-attacks

Authors

  • András Tibor Fehér Nemzeti Közszolgálati Egyetem, Hadtudományi és Honvédtisztképző Kar
  • Imre Négyesi Nemzeti Közszolgálati Egyetem, Hadtudományi és Honvédtisztképző Kar

DOI:

https://doi.org/10.18531/Studia.Mundi.2021.08.05.25-34

Keywords:

mesterséges intelligencia, kibertér, kibertámadás

Abstract

The development of computers, smart devices, and the Internet has created what is known as cyberspace, which, in addition to its many benefits, can also be used by criminal, military, or political forces against people or humanity. The pinnacle of modern technology, the artificial intelligence, also holds many dangers precisely because of its potential. Our main goal is to present the cross-section of these two novel hazards. At the same time, we can get answers to questions about how we have to approach this source of danger, as a citizen, as a leader, or as an IT operator.

Author Biographies

  • András Tibor Fehér, Nemzeti Közszolgálati Egyetem, Hadtudományi és Honvédtisztképző Kar

    egyetemi tanársegéd
    E-mail: feher.andras@uni-nke.hu

  • Imre Négyesi, Nemzeti Közszolgálati Egyetem, Hadtudományi és Honvédtisztképző Kar

    egyetemi docens
    E-mail: negyesi.imre@uni-nke.hu

References

Chartis Research (2019): The State of AI in Risk Management - Chartis Research, https://www.chartis-research.com/technology/artificial-intelligence-ai/state-ai-risk-management-10976, (megtekintve 2020. 05. 08.).

Da Silva, W. (2019): War of the Bots: Artificial Intelligence in Cyber Warfare, Dialogue & Discourse, https://medium.com/discourse/spy-vs-spy-cyber-warfare-gets-automated-aba60ece738c, (megtekintve 2020. 12. 07.).

Dickson, B. (2020): Artificial intelligence can stop IoT-based DDoS attacks in their tracks – research, The Daily Swig, https://portswigger.net/daily-swig/artificial-intelligence-can-stop-iot-based-ddos-attacks-in-their-tracks-research, (megtekintve2021. 04. 17.).

Dixon, W., Farshchi J. (2019): AI is the latest weapon cybercriminals are exploiting, https://www.weforum.org/agenda/2019/09/4-ways-ai-is-changing-cybersecurity-both-in-attack-and-defense/, (megtekintve 2020. 11. 10.).

Durbin, S. (2020): How Criminals Use Artificial Intelligence To Fuel Cyber Attacks, Forbes, https://www.forbes.com/sites/forbesbusinesscouncil/2020/10/13/how-criminals-use-artificial-intelligence-to-fuel-cyber-attacks/?sh=5e4c8ac85012, (megtekintve 2020. 07. 01).

Fabók, B. (2019): Magyar céggel csaltak el tízmilliókat az első európai hanghamisításos átverésnél, G7.hu, https://g7.hu/tech/20190903/magyar-ceggel-csaltak-el-tizmilliokat-az-elso-europai-hanghamisitasos-atveresnel/, (megtekintve 2020. 06. 01.).

Fehér, A. T. (2019): Artificial intelligence in cyberspace 2 - realizing cyber attacks with AI, RED - American Journal Of Research Education And Development, Vol. 4, 27–41 o., https://online.pubhtml5.com/lwrb/eudn/, (megtekintve 2021.04.20.).

Fu, J. (2018): Security: Using AI for Evil, https://blogs.blackberry.com/en/2018/06/security-using-ai-for-evil, (megtekintve 2020. 11. 27.).

ITM (2020): Magyarország Mesterséges Intelligencia Stratégiája 2020-2030.

ITRE (2016): Industry 4.0, https://www.europarl.europa.eu/RegData/etudes/STUD/2016/570007/IPOL_STU(2016)570007_EN.pdf, (megtekintve 2020.02.14).

Kovács, L. (2018): A kibertér védelme, Budapest, Dialóg Campus, pp. 13, 25, 166-169, ISBN: 9786155889639.

McGuire, M. (2018): Into the Web of Profit, https://www.bromium.com/wp-content/uploads/2018/05/Into-the-Web-of-Profit_Bromium.pdf, (megtekintve 2020.07.20.).

Morgan, S. (2019): Official Annual Cybercrime Report, https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf, (megtekintve 2020.07.21.).

Muha, L., Krasznay C. (2018): Az elektronikus információs rendszerek biztonságának menedzselése, Budapest, Nemzeti Közszolgálati Egyetem, pp. 47-54, ISBN: 9786155870279.

Négyesi, I. (2017): A mesterséges intelligencia és a hadsereg I., Hadtudományi Szemle, X /2, http://epa.oszk.hu/02400/02463/00035/pdf/EPA02463_hadtudomanyi_szemle_2017_2_023-034.pdf, (megtekintve 2020.02.20).

Niessner, M. (2016): Face2Face: Real-time Face Capture and Reenactment of RGB Videos, https://www.youtube.com/watch?v=ohmajJTcpNk, (megtekintve 2021. 02. 10.).

Ph. Stoecklin, M. - Jiyong J. - Kirat D. (2018): DeepLocker: How AI Can Power a Stealthy New Breed of Malware, https://securityintelligence.com/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware/, (megtekintve 2020. 11.27.).

Porter, J. (2019): Another convincing deepfake app goes viral prompting immediate privacy backlash, The Verge, https://www.theverge.com/2019/9/2/20844338/zao-deepfake-app-movie-tv-show-face-replace-privacy-policy-concerns, (megtekintve 2020. 11. 27.).

Rodriguez, M. (2019): Creating an AI Red Team to Protect Critical Infrastructure, https://www.mitre.org/publications/project-stories/creating-an-ai-red-team-to-protect-critical-infrastructure, (megtekintve 2020.11.20.).

Tech Wire Asia (2020): Industry 4.0 and cyber attacks: the AI-powered answer, https://techwireasia.com/2020/08/ai-ml-cybersecurity-cyber-defense-artificial-intelligence-apac-defence/, (megtekintve 2020. 12. 17.).

Thies, J., et al. (2016): Face2Face: Real-Time Face Capture and Reenactment of RGB Videos. Las Vegas, IEEE, 9 p., doi:10.1109/CVPR.2016.262.

Tran, D. (2017): Face2face — A Pix2Pix demo that mimics the facial expression of the German chancellor, Towards Data Science, https://towardsdatascience.com/face2face-a-pix2pix-demo-that-mimics-the-facial-expression-of-the-german-chancellor-b6771d65bf66, (megtekintve 2020. 11. 19.).

Published

2021-12-30