{"id":756,"date":"2023-09-06T16:53:58","date_gmt":"2023-09-06T16:53:58","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2023\/09\/06\/how-artificial-intelligence-is-battling-itself\/"},"modified":"2023-09-06T16:53:58","modified_gmt":"2023-09-06T16:53:58","slug":"how-artificial-intelligence-is-battling-itself","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2023\/09\/06\/how-artificial-intelligence-is-battling-itself\/","title":{"rendered":"How Artificial Intelligence Is Battling Itself"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><img decoding=\"async\" fetchpriority=\"high\" class=\"size-full wp-image-370765 img-responsive alignright\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/09\/06093347\/Artificial-intelligence-combating-cybercrime.jpg\" alt=\"Artificial intelligence combating cybercrime\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/09\/06093347\/Artificial-intelligence-combating-cybercrime.jpg 250w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/09\/06093347\/Artificial-intelligence-combating-cybercrime-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/09\/06093347\/Artificial-intelligence-combating-cybercrime-100x100.jpg 100w\" sizes=\"(max-width: 250px) 100vw, 250px\"\/>The rise of ChatGPT and other generative artificial intelligence technologies does not only threaten human jobs. It is also amplifying cyber threats. AI can help cybercriminals generate malware rapidly, automate attacks, and enhance the effectiveness of scams or social engineering attacks through deep fakes and human-sounding AI-powered voice synthesis. The cyber threat landscape is becoming more dangerous, and AI plays a big role in it.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Nevertheless, it is somehow reassuring to know that cybersecurity experts are making good use of AI technologies to improve defensive and preventative solutions. Nowadays, AI is fighting AI in a battle between good and bad intentions.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Leveraging AI for cybersecurity<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Most security solution providers are already using AI for cybersecurity. Artificial intelligence is used to automate repetitive tasks like data collection and analysis, system management, the accounting of attack surfaces, and vulnerability detection. Additionally, AI broadens situational awareness to enable better decision-making. Cybersecurity systems powered by AI can present context for the security information it displays along with response suggestions.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Notably, AI makes cybersecurity systems more effective in the following areas:<\/p>\n<ul style=\"padding-left: 5%; color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em; list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\n<li><strong>Detection of malicious activities<\/strong> \u2013 Artificial intelligence can analyze networks to establish benchmarks of safe or regular activities and spot instances that may be deemed anomalous or potentially harmful. AI is a key technology in solutions like user and entity behavior analysis (UEBA), which can detect threats continuously and in real time.<\/li>\n<li><strong>Malware detection<\/strong> \u2013 AI does not supplant threat intelligence or the identification of malware based on threat signatures. Instead, what it does is examine various factors such as file characteristics, code patterns, and behavior to determine if a file or script introduced to the system is safe or malicious.<\/li>\n<li><strong>Handling of zero-day attacks<\/strong> \u2013 With AI\u2019s ability to detect malicious activities and malware, it allows cybersecurity systems to perform better in dealing with zero-days or threats that are still unknown.<\/li>\n<li><strong>Threat intelligence<\/strong> \u2013 AI is also useful in significantly improving threat intelligence as it can automatically gather security-related information from various sources, including the dark web. Cybersecurity solutions that integrate AI can identify emerging threats, correlate indicators of compromise, and present actionable insights.<\/li>\n<li><strong>Threat management<\/strong> \u2013 Another important benefit of artificial intelligence is its ability to ease the workload of human cybersecurity analysts. It helps address alert fatigue brought about by the deluge of security alerts and event information, which usually includes excessive amounts of false positives. AI can correlate data across multiple sources to accurately determine threats and prioritize the most urgent alerts, so they can be addressed in a timely manner.<\/li>\n<li><strong>Security analytics<\/strong> \u2013 AI can go through heaps of security logs and incident data to identify trends, detect malicious activities, and examine other metrics that may be missed if organizations solely rely on human security analysts.<\/li>\n<li><strong>Proactive threat hunting<\/strong> \u2013 AI can automate the process of finding vulnerabilities and potential threats. With machine learning algorithms, it is possible to continuously monitor network traffic, logs, and other data and apply cybersecurity rules and decisions to make sure that threats are found and resolved before they can cause any problem.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"text-align: center; color: #ff6600;\"><strong>Want More Tech News? Subscribe to <i>ComputingEdge<\/i> Newsletter Today!<\/strong><\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Moreover, there are cybersecurity solutions that employ AI chatbots to assist human security analysts in evaluating situations better and making the right responses. These chatbots are built with natural language processing (NLP) to help address queries and concerns in the same way a human cybersecurity expert would. Cybersecurity chatbots allow organizations with minimal cybersecurity expertise to get the best out of the security tools they have and adopt best practices in more meaningful ways.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Abusing AI for cybercrimes<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Threat actors are relentless and resourceful, so it should not come as a surprise that they are also taking advantage of artificial intelligence for their felonious purposes. There are no recent major attacks that can serve as examples, but security experts suggest that threat actors are already using AI in the following cases:<\/p>\n<ul style=\"padding-left: 5%; color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em; list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\n<li><strong>Rapid malware generation<\/strong> \u2013 Generative AI technology is capable of coding, which means it can create malicious software quickly and easily. This allows threat actors to unleash a deluge of malicious software to random victims, whose cyber defenses may not have advanced zero-day threat detection capabilities.<\/li>\n<li><strong>Automated spear phishing<\/strong> \u2013 AI makes it easy to produce targeted and highly convincing phishing copies. With the abundance of publicly available data about potential targets, cybercriminals can develop and launch automated attacks.<\/li>\n<li><strong>AI-enhanced botnets<\/strong> \u2013 Security solutions have become considerably better at spotting and stopping botnets. That\u2019s why threat actors have started using AI to enhance the ability of their botnets to evade detection and coordinate attacks. AI also augments the command and control infrastructure of botnets. With artificial intelligence, botnets are able to analyze network behavior and reconfigure their attack patterns to adapt to cyber defenses.<\/li>\n<li><strong>Fake videos and audio<\/strong> \u2013 AI is the underlying technology for deep fakes or fabricated videos that show people saying or doing things they did not do. Also, AI is a key technology in the many text-to-speech and speech synthesis systems that can imitate the voices of real people. These fake videos and audios serve as tools for scammers as they prey on those who are still unfamiliar with the ability of current technologies to fake speech and videos.<\/li>\n<\/ul>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Artificial intelligence battles<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Cybersecurity providers use AI to improve threat intelligence, undertake behavioral analysis to detect threats without entirely relying on threat signatures, automate various tasks, and proactively hunt threats. Conversely, threat actors use AI to launch zero-day attacks at insane speeds and formulate new attack approaches. It is unclear which side is winning in this race. There are still no comprehensive documentation of actual attacks that prove that one side has been getting the better of the other.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">However, threat actors have an ace up their sleeves: adversarial attacks on cybersecurity AI systems. They can use adversarial machine learning techniques to manipulate or negatively influence AI systems used for cyber defenses. They can introduce malicious inputs and exploit vulnerabilities in algorithms, which can result in false positives or negatives. It is also possible to effectively bypass security controls with ingenious attacks.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Additionally, threat actors can engage in data poisoning and machine learning model manipulation. If they manage to gain access to the training data used by cybersecurity providers, they can compromise the integrity and performance of AI-powered cybersecurity platforms. This can render these supposedly advanced solutions inaccurate and unreliable.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Cybersecurity providers cannot do the same attacks (data poisoning and model manipulation) on threat actors, since it is impractical and they also have no specific targets to begin with. That\u2019s why the most they can do is secure their systems with great urgency and meticulousness.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">AI provides a long list of benefits for cybersecurity, but cunning cybercriminals can find ways to defeat AI systems. However, this does not mean that threat actors are winning. The growing demand for AI-powered cybersecurity solutions suggests that these solutions are working. Also, there are no signs that cybercriminals are set to overrun the global IT infrastructure anytime soon.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">With the help of cybersecurity laws and frameworks as well as government and nonprofit collaborations aimed at addressing cyber threats, there is formidable pushback against AI-powered threats. The AI vs AI showdown between cybersecurity providers and threat actors is far from over, but the good news is that the cyber defense side is working hard to fend off the attacks.<\/p>\n<p>Disclaimer<\/p>\n<div style=\"background-color: #d4f1f4; padding: 15px 15px 10px 15px;\">\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong>Disclaimer:<\/strong> The author is completely responsible for the content of this article. The opinions expressed are their own and do not represent IEEE\u2019s position nor that of the Computer Society nor its Leadership.<\/p>\n<\/div><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/trends\/ai-fighting-ai\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] The rise of ChatGPT and other generative artificial intelligence technologies does not only threaten human jobs. It is also&hellip;<\/p>\n","protected":false},"author":1,"featured_media":757,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[228,63,660,8,2],"tags":[],"class_list":["post-756","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-artificial-intelligence","category-cybercrime","category-cybersecurity","category-tech-news-post"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=756"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/756\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/757"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}