Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity
- 43 Downloads
In 2017, the WannCry and NotPeya showed that attacks targeting the cyber component of infrastructures (e.g. attacks on power plants), services (e.g. attacks to banks or hospitals servers), and endpoint devices (e.g. attacks on mobiles and personal computers) have a great disruptive potential and could cause serious damage to our information societies. WannaCry crippled hundreds of IT systems. And NotPetya costed pharmaceutical giant Merck, shipping firm Maersk and logistics company FedEx around US$300 million each. At a global level, cyber crime causes multi-billion dollar losses to businesses, with average losses per organization running from US$3.8 to US$16.8 million in the smallest and largest quartiles respectively (Accenture 2017).
The picture did not improve in 2018. Data show that over the year 2.6 million people encountered newly discovered malware on a daily basis.1Attacks ranged over 1.7 million different forms of malware, and 60% of the attacks lasted less than 1 h. Cyber...
- Acalvio Autonomous Deception. (2019). Acalvio. https://www.acalvio.com/.
- Accenture. (2017). 2017 Cost of cyber crime study. Accenture. https://www.accenture.com/gb-en/insight-cost-of-cybercrime-2017.
- BehavioSec: Continuous Authentication Through Behavioral Biometrics. (2019). BehavioSec. https://www.behaviosec.com/.
- DarkLight Offers First of Its Kind Artificial Intelligence to Enhance Cybersecurity Defenses. (2017). 26 July 2017. https://www.businesswire.com/news/home/20170726005117/en/DarkLight-Offers-Kind-Artificial-Intelligence-Enhance-Cybersecurity.
- DeepLocker: How AI Can Power a Stealthy New Breed of Malware. (2018). Security intelligence (blog). 8 August 2018. https://securityintelligence.com/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware/.
- Mirsky, Y., Mahler, T., Shelef, I., & Elovici, Y. (2019). CT-GAN: Malicious tampering of 3D medical imagery using deep learning. ResearchGate. https://www.researchgate.net/publication/330357848_CT-GAN_Malicious_Tampering_of_3D_Medical_Imagery_using_Deep_Learning/figures?lo=1.
- Taddeo, M. (2012). An analysis for a just cyber warfare. In 2012 4th international conference on cyber conflict (CYCON 2012) (pp. 1–10).Google Scholar
- The 2019 Official Annual Cybercrime Report. (2019). Herjavec group. https://www.herjavecgroup.com/the-2019-official-annual-cybercrime-report/.
- Zhuge, J., Holz, T., Han, X., Song, C., & Zou, W. (2007). Collecting autonomous spreading malware using high-interaction honeypots. In S. Qing, H. Imai, & G. Wang (Eds.), Information and communications security. Lecture notes in computer science (pp. 438–451). Berlin: Springer.CrossRefGoogle Scholar