Artificial Intelligence Cyberattacks in Red Teaming: A Scoping Review
Al-Azzawi, Mays; Doan, Dung; Sipola, Tuomo; Hautamäki, Jari; Kokkonen, Tero (2024)
Avaa tiedosto
avautuu julkiseksi: 11.05.2025
Al-Azzawi, Mays
Doan, Dung
Sipola, Tuomo
Hautamäki, Jari
Kokkonen, Tero
Editoija
Rocha, Álvaro
Adeli, Hojjat
Dzemyda, Gintautas
Moreira, Fernando
Poniszewska-Marańda, Aneta
Springer Nature
2024
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi-fe2024070360493
https://urn.fi/URN:NBN:fi-fe2024070360493
Tiivistelmä
Advances in artificial intelligence are creating possibilities to use these methods in red team activities, such as cyberattacks. These AI attacks can automate the process of penetrating a target or collecting
sensitive data while accelerating the pace of carrying out the attacks. This survey explores how AI is employed in cybersecurity attacks and what kind of targets are typical. We used scoping review methodology to sift through articles to find out AI methods, targets, and models that red teams can use to emulate cybercrime. Out of the 470 records screened, 11 were included in the review. Multiple cyberattack methods can be found to exploit sensitive data, systems, social media user profiles, passwords, and URLs. The use of AI in cybercrime to build versatile attack models poses a growing threat. Additionally, cybersecurity can use AI-based techniques to offer better protection tools to deal with those problems.
sensitive data while accelerating the pace of carrying out the attacks. This survey explores how AI is employed in cybersecurity attacks and what kind of targets are typical. We used scoping review methodology to sift through articles to find out AI methods, targets, and models that red teams can use to emulate cybercrime. Out of the 470 records screened, 11 were included in the review. Multiple cyberattack methods can be found to exploit sensitive data, systems, social media user profiles, passwords, and URLs. The use of AI in cybercrime to build versatile attack models poses a growing threat. Additionally, cybersecurity can use AI-based techniques to offer better protection tools to deal with those problems.