Abstract
The current challenge with defense against cyberattacks is that the speed and quantity of threats often outpace human-centered cyber defense capabilities. That is why a new Artificial Intelligence driven approach may enhance the effectiveness of security controls. However, it can also be used by adversaries to create more sophisticated and adaptable attack mechanisms. Distinguishing three key AI capabilities (knowledge acquisition, human-like perception and decision making), the goal of this paper is to assert where within the cyber kill chain have AI capabilities already been applied, and which phase holds the greatest near-term potential given recent developments and publications. Based on literature review, authors see the strongest potential for deploying AI capabilities during the reconnaissance, intrusion, privilege escalation and data exfiltration steps of the cyber kill chain with other uses being deployed in the remaining steps.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
World Economic Forum (WEF) - The Global Risks Report 2019. http://www3.weforum.org/docs/WEF_Global_Risks_Report_2019.pdf. Accessed 27 Jan 2019
United States Government Accountability Office (US-GAO) Information Security - Agencies Need to Improve Controls over Selected High-Impact Systems. https://www.gao.gov/assets/680/677293.pdf. Accessed 21 Jan 2019
Venkatachary, S.K., Prasad, J., Samikannu, R.: Cybersecurity and cyber terrorism - in energy sector – a review. J. Cyber Secur. Technol. 2, 111–130 (2018)
Jasper, S.: Russia and ransomware - stop the act, not the actor. The National Interest, November 2017
Verizon Data Breach Investigations Report 10th Edition. http://www.verizonenterprise.com/verizon-insights-lab/dbir/tool/. Accessed 22 Jan 2019
Zetter, K.: Countdown to Zero Day. Stuxnet and the Launch of the World’s First Digital Weapon. Random House, New York (2014)
Libicki, M., Senty, D., Pollak, J.: Hackers wanted: an examination of the cybersecurity labor market. RAND National Security Research Division, Santa Monica, California, USA (2014)
Baker, W., Jacobs, J.: Abstractions of security - mining a decade of RSA. In: RSA Conference, San Francisco (2018)
Forbes - What Is the Difference Between Artificial Intelligence and Machine Learning? https://www.forbes.com/sites/bernardmarr/2016/12/06/what-is-the-difference-between-artificial-intelligence-and-machine-learning/. Accessed 21 Mar 2019
Brashear, J., Shacklady, J., Sinclair, A.: The New Normal - Exponential Growth Powered by AI. Accenture Strategy Press (2016)
IBM QRadar Advisor with Watson. https://www.ibm.com/downloads/cas/52GBXLK8. Accessed 06 Mar 2019
Muppidi, S., Lodewijkx, K.: AI and cybersecurity – applications of artificial intelligence in security understanding and defending against adversarial AI. https://www.rsaconference.com/writable/presentations/file_upload/spo2-t07-ai_and_cybersecurity_-_applications_of_artificial_intelligence_in_security-understanding_and_defending_against_adversarial_ai.pdf. Accessed 18 Mar 2019
Wirkuttis, N., Klein, H.: Artificial intelligence in cybersecurity. Cyber Intell. Secur. 1(1), 103–119 (2017)
Goosen, R., Rontojannis, A., Deutscher, S., Rogg, J., Bohmayr, W., Mkrtchian, D.: Artificial intelligence is a threat to cybersecurity. it’s also a solution. https://www.bcg.com/publications/2018/artificial-intelligence-threat-cybersecurity-solution.aspx. Accessed 21 May 2019
IBM Adversarial Robustness Toolbox (ART v0.7.0). https://github.com/IBM/adversarial-robustness-toolbox. Accessed 05 Apr 2019
Müller, V.C., Bostrom, N.: Future progress in artificial intelligence: a survey of expert opinion. In: Müller, V.C. (ed.) Fundamental Issues of Artificial Intelligence. SL, vol. 376, pp. 553–570. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-26485-1_33
Dezeen – Christie’s sells AI-created artwork painted using algorithm for $432,000. https://www.dezeen.com/2018/10/29/christies-ai-artwork-obvious-portrait-edmond-de-belamy-design/. Accessed 20 May 2019
Lockheed Martin – gaining the advantage – applying cyber kill chain methodology to network defense. https://lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/Gaining_the_Advantage_Cyber_Kill_Chain.pdf. Accessed 27 Feb 2019
Hospelhorn, S.: Varonis - what is the cyber kill chain and how to use it effectively. https://www.varonis.com/blog/cyber-kill-chain/. Accessed 07 Mar 2019
Mitnick, K.: Art of Invisibility - He World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data. Little, Brown and Company, Boston (2017)
Recorded Future - How Artificial Intelligence Is Shaping the Future of Open Source Intelligence. https://www.recordedfuture.com/open-source-intelligence-future/. Accessed 29 Mar 2019
Kharkovyna, O.: Facial recognition and AI - latest developments and future directions. https://becominghuman.ai/facial-recognition-and-ai-latest-developments-and-future-directions-39d22201d88b. Accessed 14 Mar 2019
Balla, P.B., Jadhao, K.T.: IoT based facial recognition security system. In: 2018 International Conference on Smart City and Emerging Technology (ICSCET), India (2018)
Seymour, J., Tully, P.: Weaponizing data science for social engineering – automated E2E spear phishing on Twitter. In: DEFCON Conference (2016)
Zelonis, J., Balaouras, S., Cyr, M., Dostie, P.: The forrester MITRE ATT&CK evaluation guide (2019)
Heinemeyer, M.: Thwarting an invisible threat - how AI sniffs out the Ursnif trojan. https://www.darktrace.com/en/blog/thwarting-an-invisible-threat-how-ai-sniffs-out-the-ursnif-trojan/. Accessed 26 Mar 2019
Hitaj, B., Gasti, P., Ateniese, G., Perez-Cruz, F.: PassGAN - a deep learning approach for password guessing. In: NeurIPS 2018 Workshop on Security in Machine Learning (2018)
Sawa, Y., Bhakta, R., Harris, I.G., Hadnagy, C.: Detection of social engineering attacks through natural language processing of conversations. In: IEEE Tenth International Conference on Semantic Computing - ICSC (2016)
SentinelOne announces lateral movement detection engine. https://www.sentinelone.com/press/sentinelone-announces-lateral-movement-detection-engine-catch-unauthorized-network-movement-malicious-actors/. Accessed 04 Mar 2019
Ambre, A., Shekokarb, N.: Insider threat detection using log analysis and event correlation. Procedia Comput. Sci. 45, 436–445 (2015)
Breier, J., Branišová, J.: A dynamic rule creation based anomaly detection method for identifying security breaches in log records. Wireless Pers. Commun. 94, 497–511 (2017)
Kuriakose, J., Vinod, P.: Unknown metamorphic malware detection - modelling with fewer relevant features and robust feature selection techniques. IAENG Int. J. Comput. Sci. 42, 139–151 (2015)
Stone, M.: Fight fire with fire: how AI plays a role in both stopping and committing DDoS attacks. https://securityintelligence.com/fight-fire-with-fire-how-ai-plays-a-role-in-both-stopping-and-committing-ddos-attacks/. Accessed 14 Mar 2019
Baruah, S.: Botnet detection: analysis of various techniques. Int. J. Comput. Intell. IoT 2, 7 (2019)
Mc Carthy, S.M., Sinha, A., Tambe, M., Manadhata, P.: Data exfiltration detection and prevention: virtually distributed POMDPs for practically safer networks. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 39–61. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47413-7_3
Isaacson, W.: Innovators - How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution. Simon & Schuster, New York (2015)
Acknowledgments
The project is financed by the Ministry of Science and Higher Education in Poland under the programme “Regional Initiative of Excellence” 2019–2022 project number 015/RID/2018/19 total funding amount 10 721 040,00 PLN.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Chomiak-Orsa, I., Rot, A., Blaicke, B. (2019). Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain. In: Nguyen, N., Chbeir, R., Exposito, E., Aniorté, P., Trawiński, B. (eds) Computational Collective Intelligence. ICCCI 2019. Lecture Notes in Computer Science(), vol 11684. Springer, Cham. https://doi.org/10.1007/978-3-030-28374-2_35
Download citation
DOI: https://doi.org/10.1007/978-3-030-28374-2_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-28373-5
Online ISBN: 978-3-030-28374-2
eBook Packages: Computer ScienceComputer Science (R0)