Information Security Final
Information Security Final
A Survey
Hamza
Tayyaba
Group Qayoom Fadia Zulfiqar Moiz Ali Jafri Talha Sohail
Ghazi
Members Khan B-21349 B-21... B-21400
B-21388
b-21390
Introduction
Machine Learning Platform
Emotion Recognition
Speech Recognition
Image Recognition
Virtual Agent
Biometrics Artificial intelligence applications have been
AI used in a wide range of fields including
Artificial intelligence (AI) is Technologies from smart governance, smart buildings,
the ability of a computer smart transportation, and smart grids
program or a machine to think to smart “anything.
and learn. It is also a field of AI Progress
study which tries to make
computers "smart“
Artificial
Intelligence
(AI)
Dangers of AI
AI technologies are useful for the cyber security field by collecting large amounts of data
and then quickly filtering them to detect malicious patterns and anomalous behaviors
A lot has been published with a focus on the advancements of AI, but less attention has
been given to the dangers of AI.
The malicious use of AI is altering the landscape of potential threats against a wide range
of beneficial applications.
Particularly, the threat of malicious use of AI could threaten more complex systems such
as smart cyber-physical systems (SCPS)
Main Findings
• The main findings produced from our study are as follows:
1. AI-based cyber attacks: We found 11 case studies and classified them into
AI-based cyber five categories: nextgeneration malware, voice synthesis, password-
attacks
basedattacks, social bots, and adversarial training.
2. AI-based cyber threat framework: We used a well-established model for
AI-based cyber cyber threat representation to develop a threat framework to classify the
threat studied attacks.
framework
3. Scenario: We applied the framework to a hypothetical AI attack scenario on
a smart grid infrastructure with the goal of demonstrating how the
Scenario malicious use of AI can have a large-scale catastrophic impact.
4. The article is organized as follows. In Section 2, we provide the background
that frames our research question to set the context of our study. Then, in
Section 3, we analyze existing classifications related to malicious AI, and
Outline. existing models on cyber threat representation. Section 4 explains the
methodology used for this study. In Section 5, we review the state-of-the-art
research of AI-based cyber attacks, and demonstrate how it can be used in
the real-world case of a smart grid. Finally, in Section 6, we conclude by
discussing our contribution. The conclusions are presented in Section 7.
Malicious AI
CPCS Attacks.
CYBER COMPUTE
RBT and ML
Cybercriminal AI CRIME
Aim?
CRIME R CRIME
SCPs (smart cyber-physical systems )
SCPs (smart
cyber-physical
systems )
• What are CPS?
• What are SCPs?
Motivation • Why are they so
important ?
Security of CPS