AI Impact
AI Impact
AI Impact
RESEARCH PROPOSAL
Group members…………………………. Id
ABSTRACT...................................................................................................................1
INTRODUCTION..........................................................................................................1
STATEMENT OF PROBLEM......................................................................................2
OBJECTIVE...................................................................................................................3
GENERAL OBJECTIVE:..............................................................................................3
SPECIFIC OBJECTIVE:...............................................................................................3
LITERATURE REVIEW...............................................................................................4
METHODOLOGY.......................................................................................................10
Expected Outcomes:.....................................................................................................11
BUDGET OR COST:...................................................................................................15
REFERENCES.............................................................................................................16
ABSTRACT
In today's technologically driven world, our lives are heavily intertwined with the
internet and mobile devices. The COVID-19 pandemic has further accelerated the
shift towards online platforms for various aspects of daily life. However, this
increased reliance on technology has also given rise to a growing threat from cyber
criminals seeking to exploit vulnerabilities and gain unauthorized access to our
personal and business information. Protecting ourselves and our assets from this
significant threat has become paramount. As a result, cybersecurity has become
increasingly important in safeguarding the devices that are central to our lives,
whether it's our social media accounts or business networks. The need for enhanced
security measures has become crucial as cyber attacks have become more
sophisticated, leveraging evolving AI technologies, such as ChatGPT, to carry out
malicious activities. Artificial Intelligence holds the potential to provide the security
solutions we require to safeguard what we hold dear. The purpose of this research is
to educate the general public about the ongoing trends in the technological landscape,
raising awareness of the advancements being made and enabling individuals to
implement them for their own security, be it in their businesses or homes. This
research serves to highlight the continuous evolution of both security measures and
cyber attacks, urging individuals to remain vigilant and prepared for what the future
may hold. The thesis aims to consolidate prior research on the subject, while also
incorporating insights from professionals actively engaged in this ever-changing
industry.
1
STATEMENT OF PROBLEM
OBJECTIVE
GENERAL OBJECTIVE:
2
evaluation of existing solutions, implications of AI-driven attacks, and ethical
considerations.
SPECIFIC OBJECTIVE:
Assess the current state of AI in the cybersecurity industry, examining its existing
applications, advancements, and potential future developments.
Identify and analyze the challenges and barriers that impede the widespread
adoption and effective implementation of AI in cybersecurity practices.
Evaluate the effectiveness, limitations, and areas for improvement of AI-powered
cybersecurity solutions, with the aim of identifying best practices and potential
areas of innovation.
Investigate how malicious actors exploit AI technologies to their advantage,
exploring the tactics, techniques, and implications of AI-enabled attacks on
cybersecurity.
Explore the potential ethical and privacy concerns associated with the integration
of AI in cybersecurity, examining the balance between enhanced security
measures and the protection of individual rights and data privacy.
3
LITERATURE REVIEW
This review explores the utilization of Artificial Intelligence (AI) in the cybersecurity
industry, covering current trends and potential future directions. The discussion also
includes the significance of addressing the skill resource gap, and the exploitation of
AI by cyber criminals.
The increasing digitalization of the world has made cybersecurity paramount for
businesses to protect their assets and information (Hunter, 2020; Simonovich, 2021).
Cyber-attacks pose significant threats to both businesses and personal privacy,
necessitating effective protection measures, with AI emerging as a potential solution.
Cybersecurity encompasses a range of technologies aimed at safeguarding computers,
networks, programs, and data from cyber criminals' attacks (Xin et al., 2018). Many
organizations employ a hybrid approach that combines software and hardware
appliances across multiple layers of defense. These measures include firewalls,
antivirus software, and intrusion detection systems (IDS) (Diogenes and Ozkaya,
2018; Xin et al., 2018).
Hall's article presents alarming statistics, revealing that there have been nearly 16
billion recorded breaches and approximately 1 in 100 emails is a phishing attempt as
of June 2020 (Hall, 2021). These numbers highlight the extensive attack surface and
its continuous growth. Attackers are adapting by altering their signatures and
employing their own AI technologies. To effectively combat these evolving threats, it
is crucial to enhance defensive strategies and incorporate AI into defense
mechanisms. Traditional signature-based detection, a reactive approach, has proven
4
ineffective in defending against these evolving attacks. Therefore, the proactive
implementation of AI and machine learning (ML) as a preventative solution is
necessary to address these advancing threats (McClurg, 2020). However, it is
important to note that until AI and ML models have been trained, traditional analysis
remains the most reliable defense strategy compared to untrained AI/ML models. The
existing network and endpoint protection measures, which have been in place for
years, are becoming obsolete as hackers continuously adapt. This underscores the
need to train AI models to fill this role (Labs, 2021).
At the micro level, AI employs heuristic analysis to detect viruses by examining code
for suspicious elements. This heuristic-based detection method makes it more difficult
for zero-day attacks to infiltrate a network. For example, AI-based facial recognition
software adds an extra layer of protection to mobile devices and the networks they are
connected to (Hall, 2021).
5
The AI revolution in cybersecurity is continuously advancing. Simonovich discusses
the introduction of DeepArmor Industrial software, developed through a collaboration
between Siemens Energy and AI startup SparkCognition. This software utilizes AI to
identify and flag cyber threats proactively, even before an attack occurs (Simonovich,
2021). In 2021, global cybersecurity leader Sophos introduced several notable
developments, including the SOREL-20M dataset for accelerating malware detection,
the AI-powered Impersonation Protection Method that compares email sender names
with a database to identify suspicious messages, and the YaraML Automatic
Signature Generation Tool that enables AI to generate its own signatures ("Sophos
Announces 4 New…", 2021). These advancements represent just the beginning of the
ongoing progress in AI-driven cybersecurity.
6
indicating that the AI market in cybersecurity is projected to reach $46.3 billion by
2027, underscoring its substantial growth prospects. He identifies four key advantages
of AI implementation: its ability to improve over time, handle large volumes of data,
enable faster detection and response to attacks, and enhance overall security for
businesses. However, there is a concern that AI may produce false positives and
inaccurate results if the available datasets lack diversity. Hall suggests that Deep
Learning, a subfield of AI, could offer a solution to mitigating these false positives
(Hall, 2021).
One of the classified benefits mentioned by Hall is AI's capacity to handle vast
amounts of data, surpassing human capabilities. Many sources support this notion,
emphasizing that AI can analyze extensive datasets resulting from previous cyber-
attacks. This data analysis is crucial for identifying patterns, understanding attack
techniques, and improving future defenses. AI's ability to process and analyze such
enormous datasets is a significant advantage that human analysts alone would find
impractical or impossible to achieve.
The analysis required to develop effective solutions for future challenges surpasses
human capabilities, which is where AI comes into play (Addo et al., 2019; Addo et
al., 2020; Hall, 2021; Hunter, 2020; Maguire, 2022).
Addo et al. emphasize in their books the critical importance of both the quality and
quantity of data sources. These data sources are necessary to train AI systems
effectively, enabling them to continuously learn, adapt, and respond to new variations
of cyber-attacks (Addo et al., 2019; Addo et al., 2020; Hall, 2021).
The question of whether AI will replace humans in the future remains a subject of
debate. Some sources argue in favor of replacement (Hunter, 2020; Yampolskiy,
2017; "AI likely to replace humans...", 2021), while others contend that humans will
still be necessary (Addo et al., 2020; Labs, 2021). While nothing is certain, this
ongoing discussion is reasonable given the rapid growth of this technology.
A survey of IT leaders revealed that 41% believed AI would replace their roles in
business by 2030, while 9% disagreed ("AI likely to replace humans...", 2021).
Hunter suggests that AI algorithms can be utilized to assess vulnerabilities, identify
7
entry points, and address real-time issues, eliminating the need for humans in these
tasks (Hunter, 2020). Yampolskiy takes a more extreme perspective, warning about
the potential global consequences if a super intelligent AI (SAI) system were to fail,
expressing concerns shared by Stephen Hawking, Bill Gates, and Elon Musk
regarding the potential loss of human control over AI (Yampolskiy, 2017).
On the other hand, many sources argue that despite the growth of AI, humans will
continue to play important roles. Addo et al. explain in their book that while AI
detects threats and analyzes raw data, humans are still needed to take corrective
actions and defend against attacks (Addo et al., 2020). An interview response from
Labs similarly states that software alone cannot detect everything and that humans are
necessary to fine-tune AI or machine learning systems for specific environments
(Labs, 2021).
METHODOLOGY
Data Extraction:
Pertinent information will be extracted from the selected literature sources,
focusing on key findings, methodologies used in previous studies, and relevant
theoretical frameworks discussed by the authors. The extracted data will be
organized to facilitate subsequent analysis.
Thematic Analysis:
A thematic analysis of the literature will be conducted to identify common
themes, trends, and patterns. Similar findings and arguments will be grouped
together to form thematic categories. Themes such as improved threat detection,
enhanced response times, ethical considerations, and human-AI collaboration
may be identified.
Data Synthesis:
The findings from the literature review will be synthesized, taking into account
the identified themes and patterns. The relationships between different themes
will be analyzed, and their contributions to the overall understanding of the
impact and challenges of AI in cybersecurity will be discussed.
8
Discussion and Interpretation:
The implications of the synthesized findings will be discussed, and the results
will be interpreted in the context of the research objective and questions.
Different viewpoints and arguments presented in the literature will be compared
and contrasted, highlighting any inconsistencies or gaps in knowledge.
Expected Outcomes:
The research will analyze the current state of AI in the cybersecurity industry,
examining its existing applications, advancements, and potential future
developments. This analysis will contribute to a deeper understanding of how AI
can be effectively utilized to enhance cybersecurity practices.
The study will identify and analyze the challenges and barriers that impede the
widespread adoption and effective implementation of AI in cybersecurity. By
highlighting these obstacles, the research aims to provide insights into key areas
that need to be addressed to fully leverage the potential of AI in the field.
An evaluation of AI-powered cybersecurity solutions will be conducted to assess
their effectiveness, limitations, and areas for improvement. This evaluation will
identify best practices and potential areas of innovation, contributing to the
development of optimized AI-driven cybersecurity solutions.
The research will investigate how malicious actors exploit AI technologies to
their advantage, exploring the tactics, techniques, and implications of AI-enabled
attacks on cybersecurity. By gaining insights into these threats, the study aims to
enhance understanding of the evolving threat landscape and the need for robust
defense mechanisms.
Ethical and privacy considerations associated with the integration of AI in
cybersecurity will be explored. The research will examine the balance between
enhanced security measures and the protection of individual rights and data
privacy, providing guidance on ethical frameworks and responsible AI use in
cybersecurity.
Overall, the thesis aims to provide a comprehensive analysis of the opportunities,
challenges, and ethical dimensions of leveraging AI in the cybersecurity industry.
The expected outcomes include a deeper understanding of AI's potential in
9
cybersecurity, insights into barriers to adoption, recommendations for
improvements in AI-powered solutions, awareness of AI-enabled threats, and
guidance on ethical considerations in AI-driven cybersecurity practices.
10
detection, exploring novel AI applications in cybersecurity, or investigating the
implications of AI on privacy and data protection.
Practical Applications: The outcomes of this research have practical implications
for organizations and practitioners involved in cybersecurity. The identified
benefits, challenges, and best practices inform the design and implementation of
AI-based cybersecurity systems, helping organizations enhance their cyber
resilience and adapt to evolving threats.
In summary, this research holds significant promise in advancing knowledge,
improving cybersecurity practices, addressing challenges, providing decision
support, guiding future research, and facilitating practical applications in the field
of AI in cybersecurity.
Project Duration: The estimated duration for this research project is 6 months and 2
weeks.
Phase’s Action Plan of Action Duration
Phase 1 Project Initiation Refine the research scope 2 weeks
and identify the key
focus areas
Phase 2 Literature Review Extract data from the 6 weeks
selected literature
sources, focusing on key
findings and
methodologies used.
Conduct a thematic
analysis of the literature,
identifying common
themes and patterns.
11
Phase 3 Data Synthesis and Analyze the relationships 8 weeks
Analysis between different themes
and subtopics.
Interpret the findings in
the context of the
research objectives and
questions.
Phase 5 Report Writing and Revise and edit the report 4 weeks
Finalization for clarity, coherence,
and accuracy.
Incorporate feedback
from advisors or
reviewers.
Finalize the research
report and prepare it for
submission or
dissemination.
BUDGET OR COST:
12
THE COST
COST
Research Paper 2000 Br Budget for relevant
Equipment literature, and
Pen
specialized
equipment.
Software tools
etc
13
REFERENCES
Addo, A., Centhala, S., & Shanmugam, M. (2019). Artificial Intelligence for Risk
Management. Business Expert Press.
Addo, A., Centhala, S., & Shanmugam, M. (2020). Artificial Intelligence for
Security. Business Expert Press.
Diogenes, Y., & Ozkaya, E. (2018). Cybersecurity, attack and defense strategies:
Infrastructure security with Red Team and Blue Team tactics. Packt Publishing.
Erdogan, G., Hugo, Å., Romero, A., Varano, D., Zazzeri, N., & Žitnik, A. (2020). An
Approach to Train and Evaluate the Cybersecurity Skills of Participants in
Cyber Ranges based on Cyber-Risk Models: Proceedings of the 15th
International Conference on Software Technologies, 509–520.
https://doi.org/10.5220/0009892105090520
14