Red Teaming with Artificial Intelligence-Driven Cyberattacks: A Scoping Review
- URL: http://arxiv.org/abs/2503.19626v1
- Date: Tue, 25 Mar 2025 13:14:19 GMT
- Title: Red Teaming with Artificial Intelligence-Driven Cyberattacks: A Scoping Review
- Authors: Mays Al-Azzawi, Dung Doan, Tuomo Sipola, Jari Hautamäki, Tero Kokkonen,
- Abstract summary: This review article examines the use of AI technologies in cybersecurity attacks.<n>Various cyberattack methods were identified, targeting sensitive data, systems, social media profiles, passwords, and URLs.<n>The application of AI in cybercrime to develop versatile attack models presents an increasing threat.
- Score: 0.8388591755871736
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The progress of artificial intelligence (AI) has made sophisticated methods available for cyberattacks and red team activities. These AI attacks can automate the process of penetrating a target or collecting sensitive data. The new methods can also accelerate the execution of the attacks. This review article examines the use of AI technologies in cybersecurity attacks. It also tries to describe typical targets for such attacks. We employed a scoping review methodology to analyze articles and identify AI methods, targets, and models that red teams can utilize to simulate cybercrime. From the 470 records screened, 11 were included in the review. Various cyberattack methods were identified, targeting sensitive data, systems, social media profiles, passwords, and URLs. The application of AI in cybercrime to develop versatile attack models presents an increasing threat. Furthermore, AI-based techniques in red team use can provide new ways to address these issues.
Related papers
- A Framework for Evaluating Emerging Cyberattack Capabilities of AI [11.595840449117052]
We propose a novel approach to AI cyber capability evaluation.<n>We analyze over 12,000 instances of real-world attempts to use AI in cyberattacks.<n>Our evaluation benchmark consists of 50 new challenges spanning different phases of cyberattacks.
arXiv Detail & Related papers (2025-03-14T23:05:02Z) - Intelligent Attacks on Cyber-Physical Systems and Critical Infrastructures [0.0]
This chapter provides an overview of the evolving landscape of attacks in cyber-physical systems and critical infrastructures.<n>It highlights the possible use of Artificial Intelligence (AI) algorithms to develop intelligent cyberattacks.
arXiv Detail & Related papers (2025-01-22T09:54:58Z) - Is Generative AI the Next Tactical Cyber Weapon For Threat Actors? Unforeseen Implications of AI Generated Cyber Attacks [0.0]
This paper delves into the escalating threat posed by the misuse of AI, specifically through the use of Large Language Models (LLMs)
Through a series of controlled experiments, the paper demonstrates how these models can be manipulated to bypass ethical and privacy safeguards to effectively generate cyber attacks.
We also introduce Occupy AI, a customized, finetuned LLM specifically engineered to automate and execute cyberattacks.
arXiv Detail & Related papers (2024-08-23T02:56:13Z) - Towards more Practical Threat Models in Artificial Intelligence Security [66.67624011455423]
Recent works have identified a gap between research and practice in artificial intelligence security.
We revisit the threat models of the six most studied attacks in AI security research and match them to AI usage in practice.
arXiv Detail & Related papers (2023-11-16T16:09:44Z) - The State-of-the-Art in AI-Based Malware Detection Techniques: A Review [0.0]
This review aims to outline the state-of-the-art AI techniques used in malware detection and prevention.
The algorithms investigated consist of Shallow Learning, Deep Learning and Bio-Inspired Computing.
The survey also touches on the rapid adoption of AI by cybercriminals as a means to create ever more advanced malware.
arXiv Detail & Related papers (2022-10-12T16:44:52Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Automating Privilege Escalation with Deep Reinforcement Learning [71.87228372303453]
In this work, we exemplify the potential threat of malicious actors using deep reinforcement learning to train automated agents.
We present an agent that uses a state-of-the-art reinforcement learning algorithm to perform local privilege escalation.
Our agent is usable for generating realistic attack sensor data for training and evaluating intrusion detection systems.
arXiv Detail & Related papers (2021-10-04T12:20:46Z) - The Threat of Offensive AI to Organizations [52.011307264694665]
This survey explores the threat of offensive AI on organizations.
First, we discuss how AI changes the adversary's methods, strategies, goals, and overall attack model.
Then, through a literature review, we identify 33 offensive AI capabilities which adversaries can use to enhance their attacks.
arXiv Detail & Related papers (2021-06-30T01:03:28Z) - The Feasibility and Inevitability of Stealth Attacks [63.14766152741211]
We study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence systems.
In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself.
arXiv Detail & Related papers (2021-06-26T10:50:07Z) - Prospective Artificial Intelligence Approaches for Active Cyber Defence [1.443536831322927]
Some cybersecurity professionals are speculating AI will enable corresponding new classes of active cyber defence measures.
This position paper updates the roadmap for two of the most promising AI approaches.
It describes why they could help tip the balance back towards defenders.
arXiv Detail & Related papers (2021-04-20T14:07:34Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.