Artificial Intelligence Crime : An Overview of Malicious Use and Abuse of AI

Authors

  • Mehveen Mehdi Khatoon  Associate Professor, Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • B Manaswi Varma  Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • Porika HimaBindhu  Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India

Keywords:

Artificial Intelligence, AI Crimes, Forensic

Abstract

Artificial Intelligence (AI) advances have affected nearly every subject, including computer science, criminology, robotics etc Because of AI's outstanding ability to acquire and analyse vast amounts of data, its methodologies are suitable for tackling a range of crime-related issues. Despite the fact that AI has solved a variety of problems, AI experts have warned about the possible security risks associated with AI algorithms and training data. As AI systems inherit existing computer system security concerns, concern about unique cyberattacks aided by AI is growing. This work review literature assessment on security risks and AI-related criminality in this setting. Based on the literature analysis, this article defines AI crime and divides it into two categories: tool crime and target crime. In addition, forensic approaches are discussed. We also look at the features of AI crimes in the past and now. Traditional forensic approaches are unable to tackle problems that are tough to solve. Finally, there are some unresolved difficulties discussed, with a focus on the need to develop new AI forensics tools.

References

  1. D. Cole, "Artificial intelligence and personal identity", Synthese, vol. 88, no. 3, pp. 399-417, 1991. Available: 10.1007/bf00413555.
  2. M. Stefik, "Artificial intelligence applications for business management", Artificial Intelligence, vol. 28, no. 3, pp. 345-348, 1986. Available: 10.1016/0004-3702(86)90055-x.
  3. G. Babu, N. Anandakuma and D. Muralidhar, "Countermeasures Against DPA Attacks on FPGA Implementation ofAES", Journal of Artificial Intelligence, vol. 5, no. 4, pp. 186-192, 2012.
  4. G. Qin, T. He and J. Chen, "Model of preventing URL attacks based on artificial immunity", Journal of Computer Applications, vol. 32, no. 5, pp. 1400-1403, 2013.
  5. N. Lee, “Artificial Intelligence and Data Mining,” Counterterrorism and Cybersecurity, pp. 323–341, 2015.
  6. L. Shellberg, "A Cyber Chase in Cyber Space: How International Law Must Address the Threat of Cyber Attacks or Suffer the Consequences", SSRN Electronic Journal, 2013.
  7. H. R. Nemati, Information security and ethics: concepts, methodologies, tools, and applications. Hershey Pa.: Information Science Reference, 2008.
  8. T. Tagarev, "Intelligence, Crime and Cybersecurity", Information & Security: An International Journal, vol. 31, pp. 05-06, 2014.
  9. R. Winkels, Eleventh International Conference on Artificial Intelligence and Law: proceedings: June 4-8, 2007, Stanford Law School, Stanford, California. Place of publication not identified: ACM, 2007.
  10. D. Hutchison, M. Atiquzzaman, H.-H. Chen, T. Kanade, T.-hoon Kim, J. Kittler, J. M. Kleinberg, C. Lee, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. P. Rangan, J. H. Park, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, and S.-S. Yeo, Advances in Information Security and Assurance. Berlin, Heidelberg: Springer Berlin Heidelberg.
  11. M. Zajko, "Canada’s cyber security and the changing threat landscape", Critical Studies on Security, vol. 3, no. 2, pp. 147-161, 2015.
  12. R. Winkels, Eleventh International Conference on Artificial Intelligence and Law: proceedings: June 4-8, 2007, Stanford Law School, Stanford, California. Place of publication not identified: ACM, 2007.
  13. H. Bidgoli, Handbook of information security. Hoboken, NJ: JohnWiley, 2006.
  14. H. Zhuge, "Semantic linking through spaces for cyber-physical-socio intelligence: A methodology", Artificial Intelligence, vol. 175, no. 5- 6, pp. 988-1019, 2011.
  15. C. Blackwell and H. Zhu, Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns, 2nd ed. Cham : Springer International Publishing, 2014.

Downloads

Published

2023-06-30

Issue

Section

Research Articles

How to Cite

[1]
Mehveen Mehdi Khatoon, B Manaswi Varma, Porika HimaBindhu "Artificial Intelligence Crime : An Overview of Malicious Use and Abuse of AI" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 10, Issue 2, pp.966-970, March-April-2023.