Jahnavi Sivaram, Jigisha M Narrain, Prasad B. Honnavalli, Sivaraman Eswaran
{"title":"Adversarial machine learning: the rise in AI-enabled crime","authors":"Jahnavi Sivaram, Jigisha M Narrain, Prasad B. Honnavalli, Sivaraman Eswaran","doi":"10.12968/s1361-3723(23)70007-9","DOIUrl":null,"url":null,"abstract":"The rise in frequency and consequence of cybercrimes enabled by artificial intelligence (AI) has been a cause of concern for decades. At the same time, we've seen the development of defensive capabilities. This article examines the mechanics of AI-enabled attacks. These include voice mimicking used for crime, and natural processing algorithms absorbing harmful and offensive human text patterns to create problematic virtual situations. It also looks at shadow models – evasion, infiltration and manipulation of machine-learning models through shadow modelling techniques are on the rise due to their straightforward development methods, allowing the identification of shortcomings in input features, which can cause misclassification by the model. With a special focus on spam filters, their structure and evasion techniques, we look at the ways in which artificial intelligence is being utilised to cause harm, concluding with a final analysis of the Proofpoint evasion case.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"13 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(23)70007-9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 3
Abstract
The rise in frequency and consequence of cybercrimes enabled by artificial intelligence (AI) has been a cause of concern for decades. At the same time, we've seen the development of defensive capabilities. This article examines the mechanics of AI-enabled attacks. These include voice mimicking used for crime, and natural processing algorithms absorbing harmful and offensive human text patterns to create problematic virtual situations. It also looks at shadow models – evasion, infiltration and manipulation of machine-learning models through shadow modelling techniques are on the rise due to their straightforward development methods, allowing the identification of shortcomings in input features, which can cause misclassification by the model. With a special focus on spam filters, their structure and evasion techniques, we look at the ways in which artificial intelligence is being utilised to cause harm, concluding with a final analysis of the Proofpoint evasion case.
期刊介绍:
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world. Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.