Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2024, 7(7); doi: 10.25236/AJCIS.2024.070706.

Cyber Attacks and Defense: AI-Driven Approaches and Techniques

Author(s)

Yukai Gao

Corresponding Author:
Yukai Gao
Affiliation(s)

School of Computer Science and Technology, Xinjiang University, Urumqi, 830046, China

Abstract

This dissertation explores the application of AI-driven cyber attacks and defense methods in the field of cyber security. First, it introduces the application of AI in attacks, including AI-enhanced phishing attacks, automated phishing and spoofing, AI-driven DDoS attacks, and AI-assisted malware generation, which utilize AI's sophistication and adaptive capabilities to pose challenges to cybersecurity. The paper then discusses the use of AI in defense, such as AI-driven threat detection and prevention, anomalous behavior recognition, authentication and access control, and the use of AI in network monitoring and response, which improve the efficiency and accuracy of security teams. In addition, the paper analyzes the challenges of AI in cybersecurity, including adversarial attacks, data privacy, and ethical issues. Finally, trends and future research directions for AI in cybersecurity are discussed, including improving the robustness and interpretability of AI models. This paper emphasizes the potential of AI in cybersecurity and provides recommendations for future research.

Keywords

cyber attack and defense; AI-driven; deep learning; machine learning

Cite This Paper

Yukai Gao. Cyber Attacks and Defense: AI-Driven Approaches and Techniques. Academic Journal of Computing & Information Science (2024), Vol. 7, Issue 7: 41-46. https://doi.org/10.25236/AJCIS.2024.070706.

References

[1] Ghiasi M , Wang Z , Mehrandezh M ,et al. A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future[J].Electric Power Systems Research, 2023.

[2] Wei-Min W, Zhong-Xiong Y. Research and Practice of Network Attacks and Defense Techniques [J]. Netinfo Security, 2012.

[3] Kotenko I .Multi-agent Modelling and Simulation of Cyber-Attacks and Cyber-Defense for Homeland Security[C]//IEEE Workshop on Intelligent Data Acquisition & Advanced Computing Systems: Technology & Applications. IEEE, 2008.DOI:10.1109/IDAACS.2007.4488494.

[4] Douligeris C, Mitrokotsa A. DDoS attacks and defense mechanisms: a classification[C]// Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technology (IEEE Cat. No. 03EX795). IEEE, 2003: 190-193.