The Impact of Artificial Intelligence On Cyberspace
The Impact of Artificial Intelligence On Cyberspace
Angela W Muriuki
Silvester Makau
21/5/2021
Artificial intelligence
Artificial intelligence (AI) is intelligence demonstrated by machines, unlike the natural
intelligence displayed by humans and animals, which involves consciousness and emotionality.
The distinction between the former and the latter categories is often revealed by the acronym
chosen. 'Strong' AI is usually labelled as artificial general intelligence (AGI) while attempts to
emulate 'natural' intelligence have been called artificial biological intelligence (ABI). Leading AI
textbooks define the field as the study of "intelligent agents": any device that perceives its
environment and takes actions that maximize its chance of successfully achieving its goals.
Colloquially, the term "artificial intelligence" is often used to describe machines that mimic
"cognitive" functions that humans associate with the human mind, such as "learning" and
"problem solving".(Dobrev 2012.)
CyberSpace
Cyberspace is a global domain within the information environment consisting of the
interdependent network of information systems infrastructures including the Internet,
telecommunications networks, computer systems, and embedded processors and controllers.
(Ottis & Lorents 2010,.)Cyberspace allows users to share information, interact, swap ideas, play
games, engage in discussions or social forums, conduct business and create intuitive media,
among many other activities.
History of cyberspace
The term "cyberspace" first appeared in the visual arts in the late 1960s, when Danish artist
Susanne Ussing and her partner architect Carsten Hoff constituted themselves as Atelier
Cyberspace. Under this name the two made a series of installations and images entitled "sensory
spaces" that were based on the principle of open systems adaptable to various influences, such as
human movement and the behaviour of new materials. (Jutte & Jütte 2005,.) Don Slater uses a
metaphor to define cyberspace, describing the "sense of a social setting that exists purely within
a space of representation and communication ... it exists entirely within a computer space,
distributed across increasingly complex and fluid networks." The term "Cyberspace" started to
become a de facto synonym for the Internet, and later the World Wide Web, during the 1990s,
especially in academic circles and activist communities. Author Bruce Sterling, who popularized
this meaning,credits John Perry Barlow as the first to use it to refer to "the present-day nexus of
computer and telecommunications networks".(Slater 2000.)
Impact of AI on cybersecurity
1. Threat hunting
Traditional security techniques use signatures or indicators of compromise to identify threats.
This technique might work well for previously encountered threats, but they are not effective for
threats that have not been discovered yet.
Signature-based techniques can detect about 90% of threats. Replacing traditional techniques
with AI can increase the detection rates up to 95%, but you will get an explosion of false
positives. The best solution would be to combine both traditional methods and AI. This can
result in a 100% detection rate and minimize false positives.(Neto & dos Santos 2020.)
2. Vulnerability management
20,362 new vulnerabilities were reported in 2019, up 17.8% compared to 2018. Organizations
are struggling to prioritize and manage the large amount of new vulnerabilities they encounter on
a daily basis. Traditional vulnerability management methods tend to wait for hackers to exploit
high-risk vulnerabilities before neutralizing them.
While traditional vulnerability databases are critical to manage and contain known
vulnerabilities, AI and machine learning techniques like User and Event Behavioral Analytics
can analyze baseline behavior of user accounts, endpoint and servers, and identify anomalous
behavior that might signal a zero-day unknown attack. This can help protect organizations even
before vulnerabilities are officially reported and patched.(Benzaid & Taleb 2020.)
3. Data centers
AI can optimize and monitor many essential data center processes like backup power, cooling
filters, power consumption, internal temperatures, and bandwidth usage. The calculative powers
and continuous monitoring capabilities of AI provide insights into what values would improve
the effectiveness and security of hardware and infrastructure.
In addition, AI can reduce the cost of hardware maintenance by alerting you when you have to
fix the equipment. These alerts enable you to repair your equipment before it breaks in a more
severe manner. In fact, Google reported a 40 percent reduction in cooling costs at their facility
and a 15 percent reduction in power consumption after implementing AI technology within data
centers in 2016(Kaloudi & Li 2020.)
4. Network security
Traditional network security has two time-intensive aspects, creating security policies and
understanding the network topography of an organization.
● Policies—security policies identify which network connections are legitimate and which
you should further inspect for malicious behavior. You can use these policies to
effectively enforce a zero-trust model. The real challenge lies in creating and maintaining
the policies given the large amount of networks. (Khan &Qin 2017.)
● Topography—most organizations don’t have the exact naming conventions for
applications and workloads. As a result, security teams have to spend a lot of time
determining what set of workloads belong to a given application. (Madhok & Grover
2016)
McCorduck, P., Minsky, M., Selfridge, O. G., & Simon, H. A. (1977, August). History of
artificial intelligence. In IJCAI (pp. 951-954).
Ottis, R., & Lorents, P. (2010, April). Cyberspace: Definition and implications. In the
International Conference on Cyber Warfare and Security (p. 267). Academic Conferences
International Limited.
Jutte, R., & Jütte, R. (2005). A History of the Senses: from Antiquity to Cyberspace. Polity.
Slater, D. (2000). Political discourse and the politics of need: Discourses on the good life in
cyberspace.
Neto, A. J. H., & dos Santos, A. F. P. (2020, December). Cyber Threat Hunting Through
Automated Hypothesis and Multi-Criteria Decision Making. In 2020 IEEE International
Conference on Big Data (Big Data) (pp. 1823-1830). IEEE.
Benzaid, C., & Taleb, T. (2020). AI for Beyond 5G Networks: A Cyber-Security Defense or
Offense Enabler?. IEEE Network, 34(6), 140-147.
Kaloudi, N., & Li, J. (2020). The ai-based cyber threat landscape: A survey. ACM Computing
Surveys (CSUR), 53(1), 1-34.
Khan, S., Parkinson, S., & Qin, Y. (2017). Fog computing security: a review of current
applications and security solutions. Journal of Cloud Computing, 6(1), 1-22.
Madhok, E., Gupta, A., & Grover, N. (2016). Artificial Intelligence Impact on Cyber Security.
IITM Journal of Management and IT, 7(1), 100-107.
Khisamova, Z. I., Begishev, I. R., & Sidorenko, E. L. (2019). Artificial Intelligence and
Problems of Ensuring Cyber Security. International Journal of Cyber Criminology, 13(2), 564-
577.
Lin, T. C. (2019). Artificial Intelligence, Finance, and the Law. Fordham L. Rev., 88, 531.