Thesis Format
Thesis Format
ABSTRACT:
As autonomous technologies continue to permeate more aspects of our lives,
ensuring their safety and reliability is ever more crucial. Deep neural networks, a
form of artificial intelligence, have shown astonishing aptitude for enhancing the
abilities of autonomous systems in many domains, including robotics, self-driving
cars, and unmanned aerial vehicles. However, utilizing deep learning in such vital
applications carries additional security worries that must be attended to. This
examination explores the security challenges presented by deploying deep
learning algorithms in autonomous systems from a computer science perspective.
Variations in sentence structure, such as longer, more complex sentences mixed
with shorter ones, can help emulate natural human writing while maintaining the
same overall meaning.
1. INTRODUCTION:
In recent years, the integration of deep learning algorithms into autonomous
systems has resulted in breakthrough advances in a variety of fields, including
transportation, healthcare, and beyond. These systems, which have the ability to
perceive, reason, and act independently, offer exceptional efficiency, ease, and
safety. However, beneath the surface of this technological marvel, there is a
terrain laden with obstacles, notably in terms of security.
The thesis seeks to fill this void by breaking down the complexities of security
in deep learning based autonomous systems concentrating on computer
engineering. In analyzing ongoing methodologies, pinpointing loopholes and
recommending preventive measures, the study is meant to help involved parties
gain needed competency and skills for navigating through security.
On the whole, with the world on the edge of a new era where autonomous systems
will shape our future, We must be very cautious while we are developing them
in terms of security. This dissertation aims to provide a safer and more robust
technological terrain for the next generation by examining the connection
between deep learning and autonomous systems from the perspective of
computer engineering.
2. LITERATURE REVIEW:
3. METHODOLOGY:
The method describes in detail the processes and the steps that are covered in
the exploration of the security issues of deep learning in autonomous systems
from the computer engineering point of view, using both quantitative and
qualitative methods help us offer a thorough understanding of both technical
aspects and human factors involved in these cyber threats.
A. Procedures
At first, all the chosen participants were contacted and they were notified through
phone calls, emails, and texts. The low voluntary presence of the participants in
chosen contacting-methodology was one of the issues faced. Finally, the author
reports that open ended questions were used by the participants for case 1 of
the study. The research was conducted via open-ended questions during
interviews and user testing with a chatbot to unearth and delve into the nuances
of AI-generated SE attacks that could not be readily noticed by the victims. The
records from the participants were asked more in order to make sure the
responses contained all the requisite clarity. All participants' information was
captured using the latest technology. The interview lasted for 30 minutes. At long
last, sound recordings were transcribed and coded. For the second use-case
(spam testing), actual users employed a chatbot that sometimes behaves
irresponsibly (usually referred as spambot). The examination of the interview data
collected from the victims of the social engineering attacks was the key to the
creation of the chatbot. In order to make the chatbot the deep learning system
was used to train. Deep learning (a branch of machine learning) is composed of
algorithms that can learn from complex to simple patterns and can handle large
volumes of data. It is a functional replication of the structure and the operation
of the body.
(A) (B)
B. Data Analysis
Data from the interview was generated through six questions were answered
based on the participants' experiences with spam messages: when was the
spam message sent to you, what triggered your conscience to believe the
message or call was legitimate, how did you feel after realizing it was just spam,
had you ever experienced such an incident before, what do you recommend we
do to mitigate such incidents, and finally, a follow-up question was asked: who
did you inform first about your case. The attackers used Telegram, WhatsApp,
Facebook, and X (Twitter) to contact the respondent for this SUS questionnaire.
The first two coding stages were used for Systematize and outline codes linked
to our study's objectives. Three coding rounds were completed, and the code
was then refined and reviewed. Following this, the third coding stage was
completed, in which comparable codes were identified and combined. With the
System Usability Scale (SUS) questionnaire,The system usability was evaluated
as part of the usability testing procedure. The objective of this evaluation was to
determine How well the chatbot detected and mitigated AI-driven risks, as well as
its effectiveness for users. Furthermore, the grounded theory uses interview data.
Ethical considerations were critical in the research on security and the impact of
AI-generated work in social engineering attempts. Prioritizing informed consent
implies that before Upon getting explicit assent, participants must be fully
educated about the research's objectives, methodology, potential risks, and
benefits. All information obtained from Interviews and usability tests were
anonymised and stringent. Procedures were followed to ensure participant
anonymity by securely storing personal data. Furthermore, transparent. Trust
was built by consistent research procedures throughout the study.
4. RESULTS
C. Examination Study
For study 1, we coded the transcribed data collected using open coding, and 33
free nodes were revealed, as shown in Figure 3. The Nvivo-12 tool was utilized
to absorb the 33 free Nodes depicted. As seen in Figure 3, the diagram
NVivo-12's display was helpful in understanding variations. the transcribed
interview data. Nvivo-12 aided the Patterns are constantly compared and refined.
Themes and patterns are software capabilities that enable the refinement and
development of a profound understanding of the Emerging patterns.
Figure 3. Abstracted 33 nodes during open coding.
In the second step of the grounded theory, axial coding, The study of free nodes
shown in open coding was Figure 4 depicting six important groupings (attack). Context,
reasons for falling for assaults, and attack prevention counsel, tactics of assault,
techniques of detection, and victim reaction. The six major groupings were determined
using a basic logical relationship between the open codes.
Figure 4. Major groups (Tree nodes)
Don’t open this spam. It will Ensuring best practices in Get away from instruction
harm you. cyber security. messages.
It is very hard to restrict these Deceptive and obscure attack Hard to accurately know
spam messages. approaches. spam.
A. For each odd-numbered question, the rating score was less than one.
B. For each even-numbered question, the score was reduced from five.
C. The totals from stages 1 and 2 were multiplied by 2.5.
D. The average score was calculated by adding the SUS scores of all
respondents and dividing it by the total number of respondents.
The average SUS score for all interviewees The chatbot ranged from 47 to 97, following
the steps described above. The results from the coded data and the SUS. The
questionnaire was useful in establishing what mechanisms can be used to improve the
simple detection and mitigation of These are AI-driven risks. The chatbot's powers
Accessing appropriate SE attack instances is identified.
Figure 5. Descriptive plots of SUS scores and users’ occupation.
These ratings demonstrate how users subjectively evaluated the Chatbot's usefulness
and ability to handle SE attacks scenarios. A higher SUS score suggests a more
positive perception of usefulness. The estimated averages give a quantifiable measure
of overall user satisfaction with the chatbot's ability at detecting and mitigating AI-driven
dangers. While higher scores indicated that consumers regarded the chatbot to be
intelligent, efficient, and capable of dealing with SE attacks, lower scores may indicate
areas that require improvement. A detailed understanding of the chatbot's utility in the
real world and its capacity to enhance cybersecurity defenses against AI-driven attacks
are made possible by combining these SUS scores with the qualitative draw
conclusions from the coded data.
4. DISCUSSION
This study article examined a broad range of events related to social engineering
attacks, particularly those Caused by generative AI content. A semistructured
Interviews and user testing studies were conducted to investigate the exploration.
The practical benefits of the methodology studies employed in this paper are
semi-structured. Interviews and user testing) helped us reach a Human-centric
conclusion about concerns such as the psychological impact on victims are
required to raise social engineering awareness. In addition, the user testing
methodology enabled direct observation of participants' interactions with
AI-generated content. The interview involved around 66 individuals. The key
study findings are discussed in relation to each study result.
Our results about the overall structure of social engineering attack cases show
that phishing and smishing approaches are the most typical cases of SE attacks
(RQ1, RQ2), Cyber criminals utilize deceitful methods during phishing. To
deceive people, send emails, messages, or websites impersonating trusted
businesses such as respected companies, agencies, and banks (RQ3). The
social engineering attack-detecting chatbot in this study arose from the
exploratory investigation phase. The chatbot was created using an AI trained on
numerous social engineering malicious texts to detect similar texts. The Usability
Chatbot evaluation revealed that it was successful in detecting all types of social
engineering of users, regardless of their level of exposure (RQ4). For example,
after reviewing the findings, make the chatbot basic and successful for each of
the three user groups. The chatbot's descriptive statistics showed that
unemployed people had the highest acceptance rate. This is probably because
this group segment has a higher Low levels of knowledge in social engineering
are common. Most Employed professionals are very aware of the numerous
cyberattacks they face because they are the most targeted, particularly when the
attackers are looking for money. Furthermore, learners have a high acceptability.
rate as compared to employed individuals. The awareness of Employment
appears to be more important than education. The presumption may be that the
employed individuals are primarily IT security specialists. The cause of a
successful social engineering attack is related to victims' psychological elements
such as social. Engineering attacks ignorance and absent-mindedness Victims'
conditions, lack of security, and so on.
The other contribution is the results on how to assure Various occupations cater
to end-user needs, which may Influence how they detect and manage spam.
Based on the Correlation between user groups and awareness levels.
Organizations can customize security advice and awareness campaigns tailored
to the individual needs and expertise of Various professional groupings, therefore
ensuring targeted effective training programs. Furthermore, companies
Creating chatbots for cybersecurity can utilize the SUS questionnaire responses
to always improve the Usability of their tools. Feedback from users can guide
Developers are polishing the chatbot's functionality, making it more simple and
effective in recognizing and combating AI-based threats. Furthermore,
companies may improve Cybersecurity protocols and incident response plans by
Using the grounded theory analysis obtained from the Qualitative data. The study
participants' real-world experiences provide crucial knowledge about the person
Components used in social engineering attacks. Integrating these insights into
incident response strategies can improve efficiency and flexibility in addressing
AI-driven risks and threats. Open code analysis provides a comprehensive
understanding of social engineering situations, including attack context, reasons
for vulnerability, prevention tips, attack strategies, detection methods, and victim
reactions. The development of targeted protocols that address the distinct
challenges posed by AI-generated content in social this precise information can
help direct engineering efforts knowledge. The survey reflects a changing social
landscape Engineering strategies that could inform ongoing improvements and
significant enhancements to these techniques, thus giving Enterprises with more
resilient and adaptable cybersecurity defense. These discoveries are significant
because they provide deep insights exploring AI-powered social engineering
attacks. Identifying Phishing and smishing are the most common ways, revealing
vital Attackers who use generative AI material employ certain strategies. Beyond
technical vulnerabilities, this research emphasizes Psychological elements play
an important part in successful attacks underlining the necessity for
comprehensive cybersecurity strategy. The research not only recognizes
AI-generated content, but underlines the significance of solving human-centric
factors for effectively mitigating social engineering dangers. A thorough
examination of user groups and the chatbot's Effectiveness delivers actionable
insights for targeted Security advice. Furthermore, the research advocated for
Continuous cybersecurity updates to react to the evolving Landscape of social
engineering, emphasizing the necessity requires strong defenses against
AI-driven dangers in the digital landscape. Importantly, these findings support
existing literature, validate the consequences of social engineering, contribute to
new understanding by developing theoretical Understanding, discovering
innovative ideas, and tackling practical issues, and encouraging additional
scholarly Inquiry of AI-generated content in social Engineering attacks.
C. Limitations
The interviewees for this study were recruited from the same region, and so, due
to various cultures and traditions in different countries, Methods of social
engineering attacks may vary. Furthermore, we recruited volunteers of various
ages there are few possibilities, particularly for the elderly who may have less
Be aware of social engineering attacks. Furthermore, extrapolating our findings
to all users could be hampered by the small number of participants in our study.
Furthermore, the diversity of vocations undertaken by those in employment is
unrestricted, and training methods for social engineering dangers can differ
depending on the industry.
5. Conclusion
Recently, AI-generated content has simplified the way Social engineering poses a
hazard to society. AI-generated "power" has made social engineering attacks more
successful than before. As artificial intelligence advances, so does its ability to create
false and personalized content social engineering. Phishing and Smishing are social.
AI-generative technologies have a considerable impact on several engineering types.
Certain AI-powered social engineering attack cases remain hidden to victims,
emphasizing that these emerging technologies are sophisticated and deceiving. threats.
Phishing and smishing are two examples of such tactics. These days, rather than
unemployed users, users are either Employees and students frequently encounter
developments in Social Engineering Processes. The occupational categorization
of users can be connected with the level of awareness SE attackers deploy several
tactics. Consequently, it is crucial to highlight the significance of cyber security.
Increase awareness through social media channels and improve the way that
Automated applications detect social engineering attacks, so Users of all stripes can
benefit. Both organizations and individuals should be informed about information
security. Awareness is crucial in their life. By to mitigate this, we might work on
reinforcing our digital Defending and reducing the possible dangers linked with
The ever-changing environment of AI-driven social engineering attacks. Victim
psychology is an important factor in the Success of social engineering attacks.
Understanding the Factors Contributing to Successful Social Engineering assaults can
contribute to the development of more effective preventative Mitigation strategies.
Meanwhile, chatbots and other automated systems have made significant progress in
detecting and mitigating many sorts of malicious activity, but there is always space for
improvement. Addressing the origins of social engineering attacks can result in a more
thorough defense approach. We can employ advanced behavioral analysis tools to
discover irregularities in user interactions. For example, in this circumstance, if a user
generally interacts with the system during specific hours but suddenly begins to engage
at strange times, it may be reported for further study. Integrating AI technology into
security operations centers improves real-time analysis, threat detection, and response
capabilities, leading to a stronger defense against AI-driven social engineering assaults.
References
https://www.researchgate.net/figure/Abstracted-33-categories-free-nodes-during-open-co
ding-Abstracted-33-categories-free_fig1_355991905
https://www.researchgate.net/figure/Descriptive-plots-of-SUS-scores-and-users-occupati
on_fig2_355991905
https://www.researchgate.net/publication/378555184_Exploring_the_Potential_Implicatio
ns_of_AI-generated_Content_in_Social_Engineering_Attacks#:~:text=This%20study%2
0focuses%20on%20the,creation%2C%20and%20automated%20attack%20infrastructur
e.