Show simple item record

dc.contributor.authorFritsch, Lothar
dc.contributor.authorAlzarqawee, Aws Naser Jaber
dc.contributor.authorYazidi, Anis
dc.date.accessioned2023-10-05T12:39:51Z
dc.date.available2023-10-05T12:39:51Z
dc.date.created2022-11-25T14:44:54Z
dc.date.issued2023
dc.identifier.isbn9783031170294
dc.identifier.urihttps://hdl.handle.net/11250/3094520
dc.description.abstractArtificial intelligence (AI) and machine learning (ML) methods are increasingly adopted in cyberattacks. AI supports the establishment of covert channels, as well as the obfuscation of malware. Additionally, AI results in new forms of phishing attacks and enables hardto- detect cyber-physical sabotage. Malware creators increasingly deploy AI and ML methods to improve their attack’s capabilities. Defenders must therefore expect unconventional malware with new, sophisticated and changing features and functions. AI’s potential for automation of complex tasks serves as a challenge in the face of defensive deployment of anti-malware AI techniques. This article summarizes the state of the art in AI-enhanced malware and the evasion and attack techniques it uses against AI-supported defensive systems. Our findings include articles describing targeted attacks against AI detection functions, advanced payload obfuscation techniques, evasion of networked communication with AI methods, malware for unsupervised-learning-based cyberphysical sabotage, decentralized botnet control using swarm intelligence and the concealment of malware payloads within neural networks that fulfill other purposes. Keywords: Information Security, Artificial Intelligence, Malware, Steganography, Covert Channels, Machine Learning, Adverse Artificial Intelligenceen_US
dc.language.isoengen_US
dc.relation.ispartofNordic Artificial Intelligence Research and Development: 4th Symposium of the Norwegian AI Society, NAIS 2022, Oslo, Norway, May 31-June 1, 2022, Revised Selected Papers
dc.relation.urihttps://link.springer.com/book/9783031170317
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.subjectCybersecurityen_US
dc.subjectCybersikkerheten_US
dc.subjectKunstig intelligensen_US
dc.subjectArtificial intelligenceen_US
dc.subjectMalwareen_US
dc.subjectMalwareen_US
dc.titleAn overview of artificial intelligence used in malwareen_US
dc.typeChapteren_US
dc.typeConference objecten_US
dc.description.versionpublishedVersionen_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1
dc.identifier.cristin2081300
dc.subject.nsiVDP::Datateknologi: 551en_US
dc.subject.nsiVDP::Computer technology: 551en_US
dc.subject.nsiVDP::Annen informasjonsteknologi: 559en_US
dc.subject.nsiVDP::Other information technology: 559en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Navngivelse 4.0 Internasjonal
Except where otherwise noted, this item's license is described as Navngivelse 4.0 Internasjonal