Unleashing offensive artificial intelligence: Automated attack technique code generation

Eider Iturbe*, Oscar Llorente-Vazquez, Angel Rego, Erkuden Rios, Nerea Toledo

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Artificial Intelligence (AI) technology is revolutionizing the digital world and becoming the cornerstone of the modern digital systems. The capabilities of cybercriminals are expanding as they adopt new technologies like zero-day exploits or new business models such as hacker-as-a-service. While AI capabilities can improve cybersecurity measures, this same technology can also be utilized as an offensive cyber weapon to create sophisticated and intricate cyber-attacks. This paper describes an AI-powered mechanism for the automatic generation of attack techniques, ranging from initial attack vectors to impact-related actions. It presents a comprehensive analysis of simulated attacks by highlighting the attack tactics and techniques that are more likely to be generated using AI technology, specifically Large Language Model (LLM) technology. The work empirically demonstrates that LLM technology can be easily used by cybercriminals for attack execution. Moreover, the solution can complement Breach and Attack Simulation (BAS) platforms and frameworks that automate the security assessment in a controlled manner. BAS could be enhanced with AI-powered attack simulation by bringing forth new ways to automatically program multiple attack techniques, even multiple versions of the same attack technique. Therefore, AI-enhanced attack simulation can assist in ensuring digital systems are bulletproof and protected against a great variety of attack vectors and actions.

Original languageEnglish
Article number104077
JournalComputers and Security
Volume147
DOIs
Publication statusPublished - Dec 2024

Keywords

  • Artificial intelligence
  • Cybersecurity
  • Large Language Model
  • Offensive AI
  • Risk assessment

Fingerprint

Dive into the research topics of 'Unleashing offensive artificial intelligence: Automated attack technique code generation'. Together they form a unique fingerprint.

Cite this