Artificial Intelligence Crime : An Overview of Malicious Use and Abuse of AI
Keywords:
Artificial Intelligence, AI Crimes, ForensicAbstract
Artificial Intelligence (AI) advances have affected nearly every subject, including computer science, criminology, robotics etc Because of AI's outstanding ability to acquire and analyse vast amounts of data, its methodologies are suitable for tackling a range of crime-related issues. Despite the fact that AI has solved a variety of problems, AI experts have warned about the possible security risks associated with AI algorithms and training data. As AI systems inherit existing computer system security concerns, concern about unique cyberattacks aided by AI is growing. This work review literature assessment on security risks and AI-related criminality in this setting. Based on the literature analysis, this article defines AI crime and divides it into two categories: tool crime and target crime. In addition, forensic approaches are discussed. We also look at the features of AI crimes in the past and now. Traditional forensic approaches are unable to tackle problems that are tough to solve. Finally, there are some unresolved difficulties discussed, with a focus on the need to develop new AI forensics tools.
References
- D. Cole, "Artificial intelligence and personal identity", Synthese, vol. 88, no. 3, pp. 399-417, 1991. Available: 10.1007/bf00413555.
- M. Stefik, "Artificial intelligence applications for business management", Artificial Intelligence, vol. 28, no. 3, pp. 345-348, 1986. Available: 10.1016/0004-3702(86)90055-x.
- G. Babu, N. Anandakuma and D. Muralidhar, "Countermeasures Against DPA Attacks on FPGA Implementation ofAES", Journal of Artificial Intelligence, vol. 5, no. 4, pp. 186-192, 2012.
- G. Qin, T. He and J. Chen, "Model of preventing URL attacks based on artificial immunity", Journal of Computer Applications, vol. 32, no. 5, pp. 1400-1403, 2013.
- N. Lee, “Artificial Intelligence and Data Mining,” Counterterrorism and Cybersecurity, pp. 323–341, 2015.
- L. Shellberg, "A Cyber Chase in Cyber Space: How International Law Must Address the Threat of Cyber Attacks or Suffer the Consequences", SSRN Electronic Journal, 2013.
- H. R. Nemati, Information security and ethics: concepts, methodologies, tools, and applications. Hershey Pa.: Information Science Reference, 2008.
- T. Tagarev, "Intelligence, Crime and Cybersecurity", Information & Security: An International Journal, vol. 31, pp. 05-06, 2014.
- R. Winkels, Eleventh International Conference on Artificial Intelligence and Law: proceedings: June 4-8, 2007, Stanford Law School, Stanford, California. Place of publication not identified: ACM, 2007.
- D. Hutchison, M. Atiquzzaman, H.-H. Chen, T. Kanade, T.-hoon Kim, J. Kittler, J. M. Kleinberg, C. Lee, F. Mattern, J. C. Mitchell, M. Naor, O. Nierstrasz, C. P. Rangan, J. H. Park, B. Steffen, M. Sudan, D. Terzopoulos, D. Tygar, M. Y. Vardi, G. Weikum, and S.-S. Yeo, Advances in Information Security and Assurance. Berlin, Heidelberg: Springer Berlin Heidelberg.
- M. Zajko, "Canada’s cyber security and the changing threat landscape", Critical Studies on Security, vol. 3, no. 2, pp. 147-161, 2015.
- R. Winkels, Eleventh International Conference on Artificial Intelligence and Law: proceedings: June 4-8, 2007, Stanford Law School, Stanford, California. Place of publication not identified: ACM, 2007.
- H. Bidgoli, Handbook of information security. Hoboken, NJ: JohnWiley, 2006.
- H. Zhuge, "Semantic linking through spaces for cyber-physical-socio intelligence: A methodology", Artificial Intelligence, vol. 175, no. 5- 6, pp. 988-1019, 2011.
- C. Blackwell and H. Zhu, Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns, 2nd ed. Cham : Springer International Publishing, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.