Socialbots and the Challenges of Cyberspace Awareness
- URL: http://arxiv.org/abs/2303.02609v2
- Date: Tue, 30 May 2023 09:24:58 GMT
- Title: Socialbots and the Challenges of Cyberspace Awareness
- Authors: Shashank Yadav
- Abstract summary: We examine the mechanisms of developing situation awareness in cyberspace and the governance issues that socialbots bring into this existing paradigm of cyber situation awareness.
We conceptualise Cyberspace Awareness as a socio-technical phenomena with Syntactic, Semantic, and Operatic dimensions.
The paper contributes to the ideas of situational awareness in cyberspace, and characterises the challenges therein around tackling the increasingly social and often pervasive, automation in cyber threat environments.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As security communities brace for the emerging social automation based
threats, we examine the mechanisms of developing situation awareness in
cyberspace and the governance issues that socialbots bring into this existing
paradigm of cyber situation awareness. We point out that an organisation's
situation awareness in cyberspace is a phenomena fundamentally distinct from
the original conception of situation awareness, requiring continuous data
exchange and knowledge management where the standard implementation mechanisms
require significant policy attention in light of threats like malicious social
automation. We conceptualise Cyberspace Awareness as a socio-technical
phenomena with Syntactic, Semantic, and Operatic dimensions - each subject to a
number of stressors which are exacerbated under social automation based
threats. The paper contributes to the ideas of situational awareness in
cyberspace, and characterises the challenges therein around tackling the
increasingly social and often pervasive, automation in cyber threat
environments.
Related papers
- AI threats to national security can be countered through an incident regime [55.2480439325792]
We propose a legally mandated post-deployment AI incident regime that aims to counter potential national security threats from AI systems.
Our proposed AI incident regime is split into three phases. The first phase revolves around a novel operationalization of what counts as an 'AI incident'
The second and third phases spell out that AI providers should notify a government agency about incidents, and that the government agency should be involved in amending AI providers' security and safety procedures.
arXiv Detail & Related papers (2025-03-25T17:51:50Z) - Agentic AI Needs a Systems Theory [46.36636351388794]
We argue that AI development is currently overly focused on individual model capabilities.
We outline mechanisms for enhanced agent cognition, emergent causal reasoning ability, and metacognitive awareness.
We emphasize that a systems-level perspective is essential for better understanding, and purposefully shaping, agentic AI systems.
arXiv Detail & Related papers (2025-02-28T22:51:32Z) - Transforming Cyber Defense: Harnessing Agentic and Frontier AI for Proactive, Ethical Threat Intelligence [0.0]
This manuscript explores how the convergence of agentic AI and Frontier AI is transforming cybersecurity.
We examine the roles of real time monitoring, automated incident response, and perpetual learning in forging a resilient, dynamic defense ecosystem.
Our vision is to harmonize technological innovation with unwavering ethical oversight, ensuring that future AI driven security solutions uphold core human values of fairness, transparency, and accountability while effectively countering emerging cyber threats.
arXiv Detail & Related papers (2025-02-28T20:23:35Z) - Open Problems in Machine Unlearning for AI Safety [61.43515658834902]
Machine unlearning -- the ability to selectively forget or suppress specific types of knowledge -- has shown promise for privacy and data removal tasks.
In this paper, we identify key limitations that prevent unlearning from serving as a comprehensive solution for AI safety.
arXiv Detail & Related papers (2025-01-09T03:59:10Z) - Security in IS and social engineering -- an overview and state of the art [0.6345523830122166]
The digitization of all processes and the opening to IoT devices has fostered the emergence of a new formof crime, i.e. cybercrime.
The maliciousness of such attacks lies in the fact that they turn users into facilitators of cyber-attacks, to the point of being perceived as the weak link'' of cybersecurity.
Knowing how to anticipate, identifying weak signals and outliers, detect early and react quickly to computer crime are therefore priority issues requiring a prevention and cooperation approach.
arXiv Detail & Related papers (2024-06-17T13:25:27Z) - Advancing Social Intelligence in AI Agents: Technical Challenges and Open Questions [67.60397632819202]
Building socially-intelligent AI agents (Social-AI) is a multidisciplinary, multimodal research goal.
We identify a set of underlying technical challenges and open questions for researchers across computing communities to advance Social-AI.
arXiv Detail & Related papers (2024-04-17T02:57:42Z) - Managing extreme AI risks amid rapid progress [171.05448842016125]
We describe risks that include large-scale social harms, malicious uses, and irreversible loss of human control over autonomous AI systems.
There is a lack of consensus about how exactly such risks arise, and how to manage them.
Present governance initiatives lack the mechanisms and institutions to prevent misuse and recklessness, and barely address autonomous systems.
arXiv Detail & Related papers (2023-10-26T17:59:06Z) - Digital Deception: Generative Artificial Intelligence in Social
Engineering and Phishing [7.1795069620810805]
This paper investigates the transformative role of Generative AI in Social Engineering (SE) attacks.
We use a theory of social engineering to identify three pillars where Generative AI amplifies the impact of SE attacks.
Our study aims to foster a deeper understanding of the risks, human implications, and countermeasures associated with this emerging paradigm.
arXiv Detail & Related papers (2023-10-15T07:55:59Z) - Decoding the Threat Landscape : ChatGPT, FraudGPT, and WormGPT in Social Engineering Attacks [0.0]
Generative AI models have revolutionized the field of cyberattacks, empowering malicious actors to craft convincing and personalized phishing lures.
These models, ChatGPT, FraudGPT, and WormGPT, have augmented existing threats and ushered in new dimensions of risk.
To counter these threats, we outline a range of strategies, including traditional security measures, AI-powered security solutions, and collaborative approaches in cybersecurity.
arXiv Detail & Related papers (2023-10-09T10:31:04Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Multidimensional Cybersecurity Framework for Strategic Foresight [0.0]
The rise in National cybersecurity laws and regulations is a good indicator of its perceived importance to nations.
The conceptual cybersecurity framework comprises six domains such as Physical, Cultural, Economic, Social, Political and Cyber.
The guiding principles underpinning the framework are outlined, followed by in-depth reflection on the Business, Operational, Technological and Human (BOTH) factors.
arXiv Detail & Related papers (2022-02-05T12:30:31Z) - Beyond Robustness: A Taxonomy of Approaches towards Resilient
Multi-Robot Systems [41.71459547415086]
We analyze how resilience is achieved in networks of agents and multi-robot systems.
We argue that resilience must become a central engineering design consideration.
arXiv Detail & Related papers (2021-09-25T11:25:02Z) - A System for Automated Open-Source Threat Intelligence Gathering and
Management [53.65687495231605]
SecurityKG is a system for automated OSCTI gathering and management.
It uses a combination of AI and NLP techniques to extract high-fidelity knowledge about threat behaviors.
arXiv Detail & Related papers (2021-01-19T18:31:35Z) - Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive,
automatic cyber defense systems and their impact to the industry, society and
national security [0.0]
This paper sets the context for the urgency for cyber autonomy, and the current gaps in the cyber security industry.
A novel framework proposing four phases of maturity for full cyber autonomy will be discussed.
arXiv Detail & Related papers (2020-12-08T12:50:09Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.