Artificial Intelligence in Cybersecurity: Promise, Potential, and Pitfalls

Yuhui Gan
KTH AI Society
Published in
4 min readMay 9, 2024

Artificial Intelligence (AI) has rapidly become a cornerstone in the domain of cybersecurity, serving as both an ally in enhancing security measures but also a source of threats. With its capacity for automating complex and labor-intensive tasks such as intrusion detection, malware analysis, and spam filtering, AI technologies like machine learning (ML) and deep learning (DL) are revolutionising the way cybersecurity solutions are devised and implemented. These advanced systems significantly reduce the reliance on human intervention, enhancing the speed and efficacy of security measures.

However, the integration of AI into cybersecurity frameworks also introduces substantial challenges. One of the primary concerns is the accuracy and reliability of AI in consistently detecting threats across varied and dynamic environments. Moreover, as these AI systems increase in sophistication, they often become less transparent, obscuring the decision-making processes and potentially eroding trust, particularly in sectors involving critical infrastructure where the consequences of failure are severe.

These tools are now used to craft sophisticated phishing campaigns and generate malicious content that closely mimics legitimate user communications, making them more difficult to detect. These tools can also automate attacks at a scale and with a level of sophistication that traditional defensive measures struggle to counter.

During a recent seminar on March 19, 2024, Malin Meander Utterström from the Fujitsu cybersecurity team highlighted vulnerabilities in Internet of Things (IoT) devices in the AI era. This discussion sparked an interest in exploring how AI is being applied to enhance the cybersecurity of IoT systems, which are often critically under-defended against such evolving threats.

Enhancing H-IoT Cybersecurity with Machine Learning

As the Internet of Things (IoT) continues to grow, so do the cybersecurity challenges it faces. This is especially true for Healthcare IoT (H-IoT) devices, such as wearable health monitors and advanced diagnostic systems, which handle sensitive health data. These devices often suffer from vulnerabilities like weak authentication and unsecured data transmissions, exposing them to risks such as data breaches and unauthorised access. Such risks can have severe consequences for patient safety and privacy.

Machine Learning (ML) has become an essential tool for combating these threats by enhancing the detection of cyber threats across IoT networks. ML algorithms identify patterns and anomalies within large datasets, enabling healthcare providers to deploy advanced anomaly detection systems. These systems scrutinise device behaviour and network traffic for unusual activities, learning from historical data to preemptively identify potential threats (Mirza Akhi Khatun et al., 2023).

Figure 1. ML use cases for H-IoT cybersecurity (Mirza Akhi Khatun et al., 2023).

The article ‘Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models’ discusses two main cybersecurity methods (Alwahedi, F. et al., 2024):

Anomaly Detection: ML models establish normal operational patterns of IoT devices and network traffic. Deviations from these baselines are flagged as potential threats, enabling the detection of novel attacks and zero-day exploits.

Signature-Based Detection: ML automates the updating of threat signature databases, allowing for rapid adaptation to new threats. This keeps the detection mechanisms current and enhances their effectiveness.

While ML significantly improves IoT cybersecurity, it also brings new challenges. The complexity of ML models can make them opaque, leading to difficulties in diagnosing failures and understanding model decisions. This “black box” nature can erode trust in ML-driven systems, particularly in sensitive healthcare applications where understanding and trust are paramount.

What can we expect in the 6G era?

Looking ahead to the 6G era, this next generation of cellular technology promises even greater advancements in IoT, offering higher data rates and significantly reduced latency, which will enable more sophisticated applications. Generative AI, utilizing methods like Generative Adversarial Networks (GANs) and Transformers, is poised to play a crucial role in these networks by dynamically detecting and preventing threats with high efficiency, evidenced by accuracy rates as high as 95% (Ferrag, M. A. et al., 2023). However, the deployment of generative AI comes with its challenges, including scalability issues, the need for high-quality data, and the risk of generating false positives that could lead to resource wastage.

Generative AI presents a promising approach to cybersecurity in 6G IoT networks, offering powerful detection capabilities and significant opportunities for secure, interconnected device management.

Figure 2. A 6G-enabled IoT Network (Ferrag, M. A. et al., 2023).

As AI continues to deeply integrate into cybersecurity strategies, its dual role as both a protector and also a threat becomes increasingly significant.The advancements in AI, particularly in ML and generative AI, offer substantial benefits in threat detection and system automation but also bring about new challenges in system complexity and data management. The evolution into the 6G era represents a pivotal opportunity for leveraging AI to enhance cybersecurity measures further, especially in critical areas like healthcare IoT. However, ensuring the reliability, transparency, and ethical use of AI will be paramount in maximizing its benefits while mitigating associated risks. As we advance, continuous research, development, and regulation will be essential to harness AI’s full potential in safeguarding our increasingly digital world.

Reference

Alwahedi, F. et al. (2024) Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models. Internet of Things and Cyber-Physical Systems. [Online] 4167–185.

Ferrag, M. A. et al. (2023) Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks. [Online]

Mirza Akhi Khatun, Sanober Farheen Memon, Eising, C. and Lubna Luxmi Dhirani (2023). Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation. IEEE Access, 11, pp.145869–145896. doi:https://doi.org/10.1109/access.2023.3346320.

--

--