Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain

The current challenge with defense against cyberattacks is that the speed and quantity of threats often outpace human-centered cyber defense capabilities. That is why a new Artificial Intelligence driven approach may enhance the effectiveness of security controls. However, it can also be used by adversaries to create more sophisticated and adaptable attack mechanisms. Distinguishing three key AI capabilities (knowledge acquisition, human-like perception and decision making), the goal of this paper is to assert where within the cyber kill chain have AI capabilities already been applied, and which phase holds the greatest near-term potential given recent developments and publications. Based on literature review, authors see the strongest potential for deploying AI capabilities during the reconnaissance, intrusion, privilege escalation and data exfiltration steps of the cyber kill chain with other uses being deployed in the remaining steps.

[1]  Ravi Samikannu,et al.  Cybersecurity and cyber terrorism - in energy sector – a review , 2018, Journal of Cyber Security Technology.

[2]  Ian G. Harris,et al.  Detection of Social Engineering Attacks Through Natural Language Processing of Conversations , 2016, 2016 IEEE Tenth International Conference on Semantic Computing (ICSC).

[3]  Jakub Breier,et al.  A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records , 2015, Wireless Personal Communications.

[4]  Milind Tambe,et al.  Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks , 2016, GameSec.

[5]  Fernando Pérez-Cruz,et al.  PassGAN: A Deep Learning Approach for Password Guessing , 2017, ACNS.

[6]  Nick Bostrom,et al.  Future Progress in Artificial Intelligence: A Survey of Expert Opinion , 2013, PT-AI.

[7]  Ray Bert \IThe Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution\N, By Walter Isaacson. New York City: Simon & Schuster, 2014 , 2015 .

[8]  K. T. Jadhao,et al.  IoT Based Facial Recognition Security System , 2018, 2018 International Conference on Smart City and Emerging Technology (ICSCET).

[9]  Martin C. Libicki,et al.  Hackers Wanted: An Examination of the Cybersecurity Labor Market , 2014 .

[10]  Sarhan M. Musa,et al.  Artificial Intelligence in Cyber Security , 2020 .

[11]  Narendra Shekokar,et al.  Insider Threat Detection Using Log Analysis and Event Correlation , 2015 .