EconPapers    
Economics at your fingertips  
 

Bridging the AI divide: The evolving arms race between AI-driven cyber attacks and AI-powered cybersecurity defenses

Guy Waizel ()
Additional contact information
Guy Waizel: "Alexandru Ioan Cuza" University of Iasi, Romania

International Conference on Machine Intelligence & Security for Smart Cities (TRUST) Proceedings, 2024, vol. 1, 141-156

Abstract: The rapid advancement of artificial intelligence (AI) has significantly transformed both offensive and defensive dimensions of cybersecurity. This article explores the burgeoning landscape of AI-driven cyber-attacks and the corresponding AI-powered cybersecurity defenses. Through an extensive literature review, we establish a foundational understanding of current AI techniques used in cyber-attacks, such as machine learning-based malware and AI-generated phishing schemes. Concurrently, we examine state-of-the-art AI-driven defense mechanisms, including anomaly detection systems and automated response strategies.To provide concrete examples, we conduct detailed case studies of high-profile cyber incidents where AI played a pivotal role. These case studies illustrate the sophistication and effectiveness of AI-driven attacks and highlight the defensive measures deployed to counteract them. By juxtaposing the capabilities of offensive AI with defensive AI, we reveal a significant gap between the two, underscoring the challenges faced by cybersecurity professionals in keeping pace with rapidly evolving threats.The findings from theresearch underscore the need for continuous innovation and collaboration in the cybersecurity field to enhance AI-powered defenses. By synthesizing insights from academic research, industry practices, and real-world case studies, this article offers a comprehensive view of the current state of the AI cybersecurity arms race. Theanalysis not only illuminates the existing disparity between AI-driven attacks and defenses but also suggests strategic pathways for narrowing this gap, ultimately aiming to bolster global cyber resilience.

Keywords: Ransomware; Stealth techniques; AI techniques; APT; Malware; Cybersecurity (search for similar items in EconPapers)
JEL-codes: O35 (search for similar items in EconPapers)
Date: 2024
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
https://scrd.eu/index.php/trust/article/view/554/519 (application/pdf)
https://scrd.eu/index.php/trust/article/view/554 (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:pop:trustp:v:1:y:2024:p:141-156

Access Statistics for this article

More articles in International Conference on Machine Intelligence & Security for Smart Cities (TRUST) Proceedings from Smart-EDU Hub, Faculty of Public Administration, National University of Political Studies & Public Administration Contact information at EDIRC.
Bibliographic data for series maintained by Professor Catalin Vrabie ().

 
Page updated 2025-03-19
Handle: RePEc:pop:trustp:v:1:y:2024:p:141-156