Socialbots and the Challenges of Cyberspace Awareness
- URL: http://arxiv.org/abs/2303.02609v2
- Date: Tue, 30 May 2023 09:24:58 GMT
- Title: Socialbots and the Challenges of Cyberspace Awareness
- Authors: Shashank Yadav
- Abstract summary: We examine the mechanisms of developing situation awareness in cyberspace and the governance issues that socialbots bring into this existing paradigm of cyber situation awareness.
We conceptualise Cyberspace Awareness as a socio-technical phenomena with Syntactic, Semantic, and Operatic dimensions.
The paper contributes to the ideas of situational awareness in cyberspace, and characterises the challenges therein around tackling the increasingly social and often pervasive, automation in cyber threat environments.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As security communities brace for the emerging social automation based
threats, we examine the mechanisms of developing situation awareness in
cyberspace and the governance issues that socialbots bring into this existing
paradigm of cyber situation awareness. We point out that an organisation's
situation awareness in cyberspace is a phenomena fundamentally distinct from
the original conception of situation awareness, requiring continuous data
exchange and knowledge management where the standard implementation mechanisms
require significant policy attention in light of threats like malicious social
automation. We conceptualise Cyberspace Awareness as a socio-technical
phenomena with Syntactic, Semantic, and Operatic dimensions - each subject to a
number of stressors which are exacerbated under social automation based
threats. The paper contributes to the ideas of situational awareness in
cyberspace, and characterises the challenges therein around tackling the
increasingly social and often pervasive, automation in cyber threat
environments.
Related papers
- Security in IS and social engineering -- an overview and state of the art [0.6345523830122166]
The digitization of all processes and the opening to IoT devices has fostered the emergence of a new formof crime, i.e. cybercrime.
The maliciousness of such attacks lies in the fact that they turn users into facilitators of cyber-attacks, to the point of being perceived as the weak link'' of cybersecurity.
Knowing how to anticipate, identifying weak signals and outliers, detect early and react quickly to computer crime are therefore priority issues requiring a prevention and cooperation approach.
arXiv Detail & Related papers (2024-06-17T13:25:27Z) - Advancing Social Intelligence in AI Agents: Technical Challenges and Open Questions [67.60397632819202]
Building socially-intelligent AI agents (Social-AI) is a multidisciplinary, multimodal research goal.
We identify a set of underlying technical challenges and open questions for researchers across computing communities to advance Social-AI.
arXiv Detail & Related papers (2024-04-17T02:57:42Z) - Managing extreme AI risks amid rapid progress [171.05448842016125]
We describe risks that include large-scale social harms, malicious uses, and irreversible loss of human control over autonomous AI systems.
There is a lack of consensus about how exactly such risks arise, and how to manage them.
Present governance initiatives lack the mechanisms and institutions to prevent misuse and recklessness, and barely address autonomous systems.
arXiv Detail & Related papers (2023-10-26T17:59:06Z) - Digital Deception: Generative Artificial Intelligence in Social
Engineering and Phishing [7.1795069620810805]
This paper investigates the transformative role of Generative AI in Social Engineering (SE) attacks.
We use a theory of social engineering to identify three pillars where Generative AI amplifies the impact of SE attacks.
Our study aims to foster a deeper understanding of the risks, human implications, and countermeasures associated with this emerging paradigm.
arXiv Detail & Related papers (2023-10-15T07:55:59Z) - Decoding the Threat Landscape : ChatGPT, FraudGPT, and WormGPT in Social Engineering Attacks [0.0]
Generative AI models have revolutionized the field of cyberattacks, empowering malicious actors to craft convincing and personalized phishing lures.
These models, ChatGPT, FraudGPT, and WormGPT, have augmented existing threats and ushered in new dimensions of risk.
To counter these threats, we outline a range of strategies, including traditional security measures, AI-powered security solutions, and collaborative approaches in cybersecurity.
arXiv Detail & Related papers (2023-10-09T10:31:04Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Multidimensional Cybersecurity Framework for Strategic Foresight [0.0]
The rise in National cybersecurity laws and regulations is a good indicator of its perceived importance to nations.
The conceptual cybersecurity framework comprises six domains such as Physical, Cultural, Economic, Social, Political and Cyber.
The guiding principles underpinning the framework are outlined, followed by in-depth reflection on the Business, Operational, Technological and Human (BOTH) factors.
arXiv Detail & Related papers (2022-02-05T12:30:31Z) - Beyond Robustness: A Taxonomy of Approaches towards Resilient
Multi-Robot Systems [41.71459547415086]
We analyze how resilience is achieved in networks of agents and multi-robot systems.
We argue that resilience must become a central engineering design consideration.
arXiv Detail & Related papers (2021-09-25T11:25:02Z) - A System for Automated Open-Source Threat Intelligence Gathering and
Management [53.65687495231605]
SecurityKG is a system for automated OSCTI gathering and management.
It uses a combination of AI and NLP techniques to extract high-fidelity knowledge about threat behaviors.
arXiv Detail & Related papers (2021-01-19T18:31:35Z) - Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive,
automatic cyber defense systems and their impact to the industry, society and
national security [0.0]
This paper sets the context for the urgency for cyber autonomy, and the current gaps in the cyber security industry.
A novel framework proposing four phases of maturity for full cyber autonomy will be discussed.
arXiv Detail & Related papers (2020-12-08T12:50:09Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.