38,231
Views
14
CrossRef citations to date
0
Altmetric
Review

The Emerging Threat of Ai-driven Cyber Attacks: A Review

, , ORCID Icon, , ORCID Icon & ORCID Icon
Article: 2037254 | Received 05 Nov 2021, Accepted 28 Jan 2022, Published online: 04 Mar 2022

Figures & data

Table 1. Research Questions.

Table 2. The number of publications found in online databases.

Figure 1. PRISMA flowchart illustrating the systematic review process and article selection at various stages.

Figure 1. PRISMA flowchart illustrating the systematic review process and article selection at various stages.

Figure 2. Number of collated studies.

Figure 2. Number of collated studies.

Figure 3. Modified Cybersecurity Kill Chain for AI-Driven Attack (Kaloudi and Li Citation2020).

Figure 3. Modified Cybersecurity Kill Chain for AI-Driven Attack (Kaloudi and Li Citation2020).

Figure 4. Offensive AI Techniques Cyberattacks in the Modified Cybersecurity Kill Chain.

Figure 4. Offensive AI Techniques Cyberattacks in the Modified Cybersecurity Kill Chain.

Figure 5. Identified AI-Driven Cyberattack Techniques.

Figure 5. Identified AI-Driven Cyberattack Techniques.

Table 3. Status of existing literature with respective narration.

Figure 6. Generated keywords from titles of selected articles.

Figure 6. Generated keywords from titles of selected articles.

Figure 7. Average numbers of relevant articles.

Figure 7. Average numbers of relevant articles.

Figure 8. Publication Year.

Figure 8. Publication Year.

Figure 9. AI Techniques in the Access and Penetration Attack Stage.

Figure 9. AI Techniques in the Access and Penetration Attack Stage.

Figure 10. AI Techniques in the Delivery Stage.

Figure 10. AI Techniques in the Delivery Stage.

Table 4. Offensive Utilization of AI Techniques in the Reconnaissance Stage of Cybersecurity Kill Chain.

Table 5. Offensive Utilization of AI Techniques in the Access and Penetration Stage of Cybersecurity Kill Chain.

Table 6. Offensive Utilization of AI Techniques in the Delivery Stage of Cybersecurity Kill Chain.

Table 7. Offensive Utilization of AI Techniques in the Exploitation Stage of Cybersecurity Kill Chain.

Table 8. Offensive Utilization of AI Techniques in the C2 of Cybersecurity Kill Chain.

Figure 11. Status of existing AI-driven cyberattack tools.

Figure 11. Status of existing AI-driven cyberattack tools.

Figure 12. Success Rates of AI-Driven Password Brute-force Vs. Traditional Brute-force Attack.

Figure 12. Success Rates of AI-Driven Password Brute-force Vs. Traditional Brute-force Attack.

Figure 13. Password Brute-Force Attacks Powered by AI.

Figure 13. Password Brute-Force Attacks Powered by AI.

Figure 14. Traditional Targeted Cyberattack Decision Logic.

Figure 14. Traditional Targeted Cyberattack Decision Logic.

Figure 15. DNN Cyberattack Decision Logic.

Figure 15. DNN Cyberattack Decision Logic.