{"id":9858,"date":"2017-08-29T02:35:05","date_gmt":"2017-08-29T02:35:05","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=9858"},"modified":"2017-08-30T02:36:57","modified_gmt":"2017-08-30T02:36:57","slug":"artificial-intelligence-cyber-attacks-are-coming-but-what-does-that-mean","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/artificial-intelligence-cyber-attacks-are-coming-but-what-does-that-mean\/","title":{"rendered":"Artificial intelligence cyber attacks are coming \u2013 but what does that mean?"},"content":{"rendered":"<p><span><a href=\"https:\/\/theconversation.com\/profiles\/jeremy-straub-312014\">Jeremy Straub<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/north-dakota-state-university-823\">North Dakota State University<\/a><\/em><\/span><\/p>\n<p>The next major cyberattack could involve artificial intelligence systems. It could even happen soon: At a recent cybersecurity conference, 62 industry professionals, <a href=\"https:\/\/www.cylance.com\/en_us\/blog\/black-hat-attendees-see-ai-as-double-edged-sword.html\">out of the 100 questioned<\/a>, said they thought the first AI-enhanced cyberattack could come in the next 12 months.<\/p>\n<p>This doesn\u2019t mean robots will be marching down Main Street. Rather, artificial intelligence will make existing cyberattack efforts \u2013 things like identity theft, denial-of-service attacks and password cracking \u2013 more powerful and more efficient. This is dangerous enough \u2013 this type of hacking can steal money, <a href=\"https:\/\/www.equifax.com\/assets\/PSOL\/15-9814_psol_emotionalToll_wp.pdf\">cause emotional harm<\/a> and even <a href=\"https:\/\/www.wired.com\/2016\/08\/jeep-hackers-return-high-speed-steering-acceleration-hacks\/\">injure or kill people<\/a>. Larger attacks can <a href=\"https:\/\/doi.org\/10.1109\/JPROC.2011.2165269\">cut power<\/a> to <a href=\"http:\/\/dx.doi.org\/10.1111\/risa.12844\">hundreds of thousands of people<\/a>, <a href=\"https:\/\/theconversation.com\/the-petya-ransomware-attack-shows-how-many-people-still-dont-install-software-updates-77667\">shut down hospitals<\/a> and even <a href=\"http:\/\/dx.doi.org\/10.1111\/risa.12844\">affect national security<\/a>. <\/p>\n<p>As a scholar who has <a href=\"https:\/\/doi.org\/10.1016\/j.techsoc.2013.12.004\">studied AI decision-making<\/a>, I can tell you that interpreting human actions is still difficult for AI\u2019s and that humans <a href=\"https:\/\/theconversation.com\/finding-trust-and-understanding-in-autonomous-technologies-70245\">don\u2019t really trust AI systems<\/a> to make major decisions. So, unlike in the movies, the capabilities AI could bring to cyberattacks \u2013 and cyberdefense \u2013 are not likely to immediately involve computers choosing targets and attacking them on their own. People will still have to create attack AI systems, and launch them at particular targets. But nevertheless, adding AI to today\u2019s cybercrime and cybersecurity world will <a href=\"https:\/\/doi.org\/10.1016\/j.techsoc.2015.12.003\">escalate<\/a> what is already a rapidly changing arms race between attackers and defenders.<\/p>\n<h2>Faster attacks<\/h2>\n<p>Beyond computers\u2019 lack of need for food and sleep \u2013 needs that limit human hackers\u2019 efforts, even when they work in teams \u2013 automation can make complex attacks much faster and more effective. <\/p>\n<p>To date, the effects of automation have been limited. Very rudimentary AI-like capabilities have for decades given virus programs <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/about\/security-center\/virus-differences.html\">the ability to self-replicate<\/a>, spreading from computer to computer without specific human instructions. In addition, programmers have used their skills to automate different elements of hacking efforts. Distributed attacks, for example, involve triggering a remote program on several computers or devices to overwhelm servers. The attack that <a href=\"https:\/\/www.welivesecurity.com\/2016\/10\/24\/10-things-know-october-21-iot-ddos-attacks\/\">shut down large sections of the internet in October 2016<\/a> used this type of approach. In some cases, common attacks are made available as a script that allows an unsophisticated user to choose a target and launch an attack against it.<\/p>\n<p>AI, however, could help human cybercriminals customize attacks. <a href=\"https:\/\/theconversation.com\/spearphishing-roiled-the-presidential-campaign-heres-how-to-protect-yourself-68274\">Spearphishing attacks<\/a>, for instance, require attackers to have personal information about prospective targets, details like where they bank or what medical insurance company they use. AI systems can help gather, organize and process large databases to connect identifying information, making this type of attack easier and faster to carry out. That reduced workload may drive thieves to launch lots of smaller attacks that go unnoticed for a long period of time \u2013 if detected at all \u2013 due to their more limited impact.<\/p>\n<p>AI systems could even be used to pull information together from multiple sources to identify people who would be particularly vulnerable to attack. Someone who is hospitalized or in a nursing home, for example, might not notice money missing out of their account until long after the thief has gotten away.<\/p>\n<h2>Improved adaptation<\/h2>\n<p>AI-enabled attackers will also be much faster to react when they encounter resistance, or when cybersecurity experts fix weaknesses that had previously allowed entry by unauthorized users. The AI may be able to exploit another vulnerability, or start scanning for new ways into the system \u2013 without waiting for human instructions. <\/p>\n<p>This could mean that human responders and defenders find themselves unable to keep up with the speed of incoming attacks. It may result in a <a href=\"https:\/\/doi.org\/10.1016\/j.techsoc.2015.12.003\">programming and technological arms race<\/a>, with defenders developing AI assistants to identify and protect against attacks \u2013 or perhaps even AI\u2019s with <a href=\"https:\/\/theconversation.com\/cybersecuritys-next-phase-cyber-deterrence-67090\">retaliatory attack capabilities<\/a>.<\/p>\n<h2>Avoiding the dangers<\/h2>\n<p>Operating autonomously could lead AI systems to attack a system it shouldn\u2019t, or <a href=\"https:\/\/www.theguardian.com\/world\/2015\/jul\/02\/robot-kills-worker-at-volkswagen-plant-in-germany\">cause unexpected damage<\/a>. For example, software started by an attacker intending only to steal money might decide to target a hospital computer in a way that causes human injury or death. The potential for <a href=\"https:\/\/doi.org\/10.2139\/ssrn.2283767\">unmanned aerial vehicles to operate autonomously<\/a> has raised similar questions of the need for <a href=\"https:\/\/theconversation.com\/losing-control-the-dangers-of-killer-robots-58262\">humans to make the decisions about targets<\/a>. <\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/counter.theconversation.edu.au\/content\/82035\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/>The consequences and implications are significant, but most people won\u2019t notice a big change when the first AI attack is unleashed. For most of those affected, the outcome will be the same as human-triggered attacks. But as we continue to fill our homes, factories, offices and roads with internet-connected robotic systems, the potential effects of an attack by artificial intelligence only grows.<\/p>\n<p><span><a href=\"https:\/\/theconversation.com\/profiles\/jeremy-straub-312014\">Jeremy Straub<\/a>, Assistant Professor of Computer Science, <em><a href=\"http:\/\/theconversation.com\/institutions\/north-dakota-state-university-823\">North Dakota State University<\/a><\/em><\/span><\/p>\n<p>This article was originally published on <a href=\"http:\/\/theconversation.com\">The Conversation<\/a>. Read the <a href=\"https:\/\/theconversation.com\/artificial-intelligence-cyber-attacks-are-coming-but-what-does-that-mean-82035\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jeremy Straub, North Dakota State University The next major cyberattack could involve artificial intelligence systems. It could even happen soon: At a recent cybersecurity conference, 62 industry professionals, out of the 100 questioned, said they thought the first AI-enhanced cyberattack could come in the next 12 months. This doesn\u2019t mean robots will be marching down [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":9860,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[8,1],"tags":[401,3028,3027,887,798,612,793],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/9858"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=9858"}],"version-history":[{"count":2,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/9858\/revisions"}],"predecessor-version":[{"id":9862,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/9858\/revisions\/9862"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/9860"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=9858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=9858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=9858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}