Managing Cyber Risks in the Face of AI- and ML-driven Adversarial Attacks

Authors

DOI:

https://doi.org/10.70301/CONF.SBS-JABR.2024.1/1.6

Keywords:

cyber risk management, AI-driven, ML-driven, adversarial attacks, cyber risk frameworks

Abstract

This paper presents a critical analysis of current cyber risk management practices in light of new and evolving Artificial Intelligence (AI) and Machine Learning driven adversarial attacks. Many enterprises are constantly grappling with cybersecurity risks and increased threats from phishing, ransomware and many other forms of cyber attacks, often resulting in substantial financial losses when the risks are not adequately addressed.  With the advent of Artificial Intelligence (AI) and Machine Learning (ML), such cyber attacks and incidents will become more prevalent and potentially more devastating to businesses large and small. With AI and ML tools at their disposal, cybercriminals can dramatically reduce technical barriers for launching cyberattacks. They can easily develop more sophisticated social engineering tactics and ‘deep fakes’ that are not easily identifiable as such, thereby increasing the risks of unauthorized data disclosure. Drawing on literature review analysis, this research explores current and emerging AI- and ML-driven cyber threats faced by enterprises, effectiveness of current cyber mitigation measures and future management practices that can be leveraged to improve the security posture of enterprises. The study evaluates both technical and non-technical cyber risk management and mitigation measures and frameworks. The findings from this study help inform enterprise cyber risk managers and practitioners about the enormity of AI- and ML-driven cyber risks and presents emerging best practices to adequately mitigate those risks. The study contributes to the growing research on how threat actors are leveraging and AI and ML to expand cyber threats and how enterprises and organizations should respond to these ever evolving cyber risks.

References

Agzayal, Y., & Bouhorma, M. (2024). AI-Driven Cyber Risk Management Framework. In: Ben Ahmed, M., Boudhir, A.A., El Meouche, & R., Karas, İ.R. (eds) Innovations in Smart Cities Applications Volume 7. SCA 2023. Lecture Notes in Networks and Systems, vol 906. Springer, Cham. https://doi.org/10.1007/978-3-031-53824-7_51

Asatiani, A., Malo, P., Nagbøl, P. R., Penttinen, E., Rinta-Kahila, T., & Salovaara, A., (2020) "Challenges of Explaining the Behavior of Black-Box AI Systems," MIS Quarterly Executive: Vol. 19 : Iss. 4 , Article 7. https://aisel.aisnet.org/misqe/vol19/iss4/7

Aziz, S. & Dowling, M. (2019). Machine Learning and AI for Risk Management. In: Lynn, T., Mooney, J., Rosati, P., Cummins, M. (eds) Disrupting Finance. Palgrave Studies in Digital Business & Enabling Technologies. Palgrave Pivot, Cham. https://doi.org/10.1007/978-3-030-02330-0_3

Carabantes, M. (2020) Black-box artificial intelligence: an epistemological and critical analysis. AI & Soc 35, 309–317 (2020). https://doi.org/10.1007/s00146-019-00888-w

Chaddad A, Peng J, Xu J, Bouridane A. Survey of Explainable AI Techniques in Healthcare. Sensors. 2023; 23(2):634. https://doi.org/10.3390/s23020634

Chakravorti, B. (2024), AI’s Trust Problem - Twelve persistent risks of AI that are driving skepticism, https://hbr.org/2024/05/ais-trust-problem

Foysal, A., Islam, S.M., & Rahaman, T. (2019). Classification of AI Powered Social Bots on Twitter by Sentiment Analysis and Data Mining through SVM. International Journal of Computer Applications, 177, 13-19.

Fritsch, L., Jaber, A., & Yazidi, A. (2022). An Overview of Artificial Intelligence Used in Malware. In: Zouganeli, E., Yazidi, A., Mello, G., Lind, P. (eds) Nordic Artificial Intelligence Research and Development. NAIS 2022. Communications in Computer and Information Science, vol 1650. Springer, Cham. https://doi.org/10.1007/978-3-031-17030-0_4

Guembe, B., Azeta, A., Misra, S., Osamor, V. C., Fernandez-Sanz, L., & Pospelova, V. (2022). The Emerging Threat of Ai-driven Cyber Attacks: A Review. Applied Artificial Intelligence, 36(1). https://doi.org/10.1080/08839514.2022.2037254

Hart, D. (2023). Uncovering How AI's Dual Relationship With Cybersecurity Operates, https://www.forbes.com/councils/forbestechcouncil/2023/06/28/uncovering-how-ais-dual-relationship-with-cybersecurity-operates/

Kaloudi, N. and Li, J. 2020. The AI-Based Cyber Threat Landscape: A Survey. ACM Comput. Surv. 53, 1, Article 20 (January 2021), 34 pages. https://doi.org/10.1145/3372823

Kumar, P. Adversarial attacks and defenses for large language models (LLMs): methods, frameworks & challenges. Int J Multimed Info Retr 13, 26 (2024). https://doi.org/10.1007/s13735-024-00334-8

Ishai R., Asaf S., Yuval E., & Lior R. (2021). Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. ACM Comput. Surv. 54, 5, Article 108 (June 2022), 36 pages. https://doi.org/10.1145/3453158

Lyu, S. (2024). "DeepFake the menace: mitigating the negative impacts of AI-generated content", Organizational Cybersecurity Journal: Practice, Process and People, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/OCJ-08-2022-0014

Malatji, M., & Tolah, A. (2024). Artificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for understanding adversarial and offensive AI. AI Ethics. https://doi.org/10.1007/s43681-024-00427-4

Filiz Mizrak (2023). Integrating cybersecurity risk management into strategic management: a comprehensive literature review. Research Journal of Business and Management (RJBM), 10(3), 98-108. http://doi.org/10.17261/Pressacademia.2023.1807

Minh, D., Wang, H.X., Li, Y.F. et al. Explainable artificial intelligence: a comprehensive review. Artif Intell Rev 55, 3503–3568 (2022). https://doi.org/10.1007/s10462-021-10088-y

National Institute of Standards and Technology (2024) The NIST Cybersecurity Framework (CSF) 2.0. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Cybersecurity White Paper (CSWP) NIST CSWP 29. https://doi.org/10.6028/NIST.CSWP.29

Núñez, F., Esteban, J. (2022). Adversarial machine learning for cyber security http://hdl.handle.net/2117/372347

Radanliev, P., De Roure, D., Page, K., Nurse, J.R.C., Mantilla M. R., Santos, O., Maddox, L., & Burnap, P. (2020). Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains, Cybersecurity, Volume 3, Article number 13 (2020). https://doi.org/10.1186/s42400-020-00052-8

Salem, A.H., Azzam, S.M., Emam, O.E., & Abohany, A., A. (2024). Advancing cybersecurity: a comprehensive review of AI-driven detection techniques. J Big Data 11, 105. https://doi.org/10.1186/s40537-024-00957-y

Shashkov A, Hemberg E, Tulla M, O’Reilly U-M. Adversarial agent-learning for cybersecurity: a comparison of algorithms. The Knowledge Engineering Review. 2023;38:e3. doi:10.1017/S0269888923000012

Schreiber, A. & Schreiber, I. (2024). Bridging knowledge gap: the contribution of employees’ awareness of AI cyber risks comprehensive program to reducing emerging AI digital threats, Information and Computer Security, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/ICS-10-2023-0199

Van Haastrecht, M et. al. 2021. Respite for SMEs: A systematic review of sociotechnical cybersecurity metrics. Applied Sciences (Switzerland) 11, 15 (8 2021), 6909. https://doi.org/10.3390/app11156909

Waizel, G. (2024). Bridging the AI divide: The evolving arms race between AI-driven cyber attacks and AI-powered cybersecurity defenses. In International Conference on Machine Intelligence & Security for Smart Cities (TRUST) Proceedings (Vol. 1, pp. 141-156). https://www.scrd.eu/index.php/trust/article/view/554

Mirsky, Y., Demontis, A., Kotak, J., Shankar, R., Gelei, D., Yang, L., Zhang, X., Pintor, M., Lee, M., Elovici, Y., & Biggio, B. (2023). The Threat of Offensive AI to Organizations, Computers & Security, Volume 124, 2023, 103006, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2022.103006

Wang, Y et al. (2023), "Adversarial Attacks and Defenses in Machine Learning-Empowered Communication Systems and Networks: A Contemporary Survey," in IEEE Communications Surveys & Tutorials, vol. 25, no. 4, pp. 2245-2298, Fourthquarter 2023, https://doi.org/10.1109/COMST.2023.3319492

Yamin, M. M., Ullah, M., Ullah, H., & Katt,B. (2021). Weaponized AI for cyber attacks,

Yang, W., Wei, Y., Wei, H. et al. Survey on Explainable AI: From Approaches, Limitations and Applications Aspects. Hum-Cent Intell Syst 3, 161–188 (2023). https://doi.org/10.1007/s44230-023-00038-y

Additional Files

Published

14.01.2026

Issue

Section

SBS International Research Conference 2024

How to Cite

Managing Cyber Risks in the Face of AI- and ML-driven Adversarial Attacks. (2026). SBS Journal of Applied Business Research, 71-79. https://doi.org/10.70301/CONF.SBS-JABR.2024.1/1.6

Similar Articles

21-30 of 101

You may also start an advanced similarity search for this article.