SlideShare a Scribd company logo
1 of 13
AI BASES CYBER ATTACKS
By Osama ellahi
https://osamaellahi.significantbyte.com/
Add a Footer 2
WHERE ARE WE STANDING
AI OFFERS TO
WRITE FAKE
NEWS
3
• GPT-2 is the name of the machine
learning model that was trained on a
dataset of 8 million web pages.
• It was able to adapt the style and content
of some of the first pages that it was
given from the data.
• Open AI created an AI algorithm that
has been fed with a really large
amount of data.
• The AI program “learned” through this
information how words are assembled
and aim to predict the next word.
AI BASES CYBER
ATTACK_____
4
https://talktotransformer.com/
LETS CREATE A FAKE NEWS
President of Pakistan will be launching --------------
President of Pakistan will be launching the aircraft carrier at first and after
that he will chair a grand ship naming ceremony at the Karachi Shipyard and Works
Company on August 12.
5
• This is much more complex that I would
have expected
• Is closer to written English literature than
spoken English language
• Is generated extremely quickly (less than a
second maximum for each paragraph)
• Can significantly differ even with the same
input
FAKE NEWS FOR AUDIO AND
VIDEO
• The Descript software developed by the company Lyrebird allows a
user to clone a voice based on data samples.
• The amount of information needed to train the algorithm has been
drastically reducing over the years making it possible to create a cloned
voice with minimal amount of data.
• Deepfake type of software uses artificial intelligence to allow a user
to create fake videos of someone by substituting faces.
Add a Footer 6
Data poisoning
• Use machine learning against
machine learning
• Data is blood for machine learning.
• Give some misleading blood .
• Research suggests that a 3% training
data set poisoning leads to an 11%
drop in accuracy.
AI-Supported Password
Guessing
• HashCat and John the Ripper
• Generative Adversarial Networks
(GANs)
• This will lead to more accurate and
targeted password guesses and
higher chances for profit.
7
HUMAN IMPERSONATION
ON SOCIAL NETWORKING
PLATFORMS
An AI-supported Spotify bot on a forum called
nulled[.]to claims to have the capability to mimic
several Spotify users simultaneously.
It makes use of multiple proxies.
To further evade detection, it also creates playlists
with other songs that follow human-like musical
tastes rather than playlists with random songs, as
the latter might hint at bot-like behavior.
11%
19%
17%
29%
24%
CHART TITLE
Jan Feb Mar Apr May
8
PWNAGOTCHI 1.0.0
• Tool that was originally developed for Wi-Fi
hacking through de-authentication attacks.
• Uses a neural network model to improve its
hacking performance via a gamification strategy
• When the system successfully de-authenticates
Wi-Fi credentials, it gets rewarded and learns to
autonomously improve its operation.
9
10
SANDBOX EVASION TECHNIQUE
• The next generation AI malware that reach to target
using face recognition.
• The malicious payload will only be unlocked if the
intended target is reached. It achieves this by using a
deep neural network (DNN) AI model.
• It reaches to the target by watching every person face,
face recognition identification.
DEEP LOCKER BY IBM
11
THANK YOU
12
13
REFERENCES
https://analyticsindiamag.com/top-ai-based-attacks-that-shocked-the-world-in-2019/
https://cybersecurity-magazine.com/open-ai-gpt-2-security-towards-an-information-crisis/
https://analyticsindiamag.com/5-artificial-intelligence-based-attacks-that-shocked-the-world-in-2018/
https://crimesciencejournal.biomedcentral.com/articles/10.1186/s40163-020-00123-8
https://www.apriorit.com/dev-blog/545-sandbox-evading-malware
https://hub.packtpub.com/ibms-deeplocker-the-artificial-intelligence-powered-sneaky-new-breed-of-malware/

More Related Content

Similar to Artificial intelligence base advance cyber attacks overview

AI and Blockchain with Reference to IPRs-Advocate_Prity_Khastgir.pdf
AI and Blockchain with Reference to IPRs-Advocate_Prity_Khastgir.pdfAI and Blockchain with Reference to IPRs-Advocate_Prity_Khastgir.pdf
AI and Blockchain with Reference to IPRs-Advocate_Prity_Khastgir.pdf
Tech Corp International Strategist
 
Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]
mhuntsman0002
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
Bruce Wolfe
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
mahendrarm2112
 

Similar to Artificial intelligence base advance cyber attacks overview (20)

Machine Learning - Know Enough To Be Dangerous #SearchLove
Machine Learning - Know Enough To Be Dangerous #SearchLoveMachine Learning - Know Enough To Be Dangerous #SearchLove
Machine Learning - Know Enough To Be Dangerous #SearchLove
 
SearchLove San Diego 2019 - Britney Muller - Machine Learning: Know Enough To...
SearchLove San Diego 2019 - Britney Muller - Machine Learning: Know Enough To...SearchLove San Diego 2019 - Britney Muller - Machine Learning: Know Enough To...
SearchLove San Diego 2019 - Britney Muller - Machine Learning: Know Enough To...
 
10 ways AI can be used for investigations
10 ways AI can be used for investigations10 ways AI can be used for investigations
10 ways AI can be used for investigations
 
Revolutionize the way you work with AI and ChatGPT..gslides (2).pdf
Revolutionize the way you work with AI and ChatGPT..gslides (2).pdfRevolutionize the way you work with AI and ChatGPT..gslides (2).pdf
Revolutionize the way you work with AI and ChatGPT..gslides (2).pdf
 
AI - PAST, PRESENT, FUTURE.pptx
AI - PAST, PRESENT, FUTURE.pptxAI - PAST, PRESENT, FUTURE.pptx
AI - PAST, PRESENT, FUTURE.pptx
 
Mindspark 21' - Sparrow platform
Mindspark 21' - Sparrow platform Mindspark 21' - Sparrow platform
Mindspark 21' - Sparrow platform
 
FOSS and Security
FOSS and SecurityFOSS and Security
FOSS and Security
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
An Introduction to Generative AI - May 18, 2023
An Introduction  to Generative AI - May 18, 2023An Introduction  to Generative AI - May 18, 2023
An Introduction to Generative AI - May 18, 2023
 
An Introduction to Generative AI
An Introduction  to Generative AIAn Introduction  to Generative AI
An Introduction to Generative AI
 
AI and Blockchain with Reference to IPRs-Advocate_Prity_Khastgir.pdf
AI and Blockchain with Reference to IPRs-Advocate_Prity_Khastgir.pdfAI and Blockchain with Reference to IPRs-Advocate_Prity_Khastgir.pdf
AI and Blockchain with Reference to IPRs-Advocate_Prity_Khastgir.pdf
 
Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]Chapter 3 using_the_internet[1]
Chapter 3 using_the_internet[1]
 
Designing & Building Secure Web APIs
Designing & Building Secure Web APIsDesigning & Building Secure Web APIs
Designing & Building Secure Web APIs
 
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
Artificial Intelligence in testing - A STeP-IN Evening Talk Session Speech by...
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
2023-May.pptx
2023-May.pptx2023-May.pptx
2023-May.pptx
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Open source-secret-sauce-rit-2010
Open source-secret-sauce-rit-2010Open source-secret-sauce-rit-2010
Open source-secret-sauce-rit-2010
 
Big data and APIs for PHP developers - SXSW 2011
Big data and APIs for PHP developers - SXSW 2011Big data and APIs for PHP developers - SXSW 2011
Big data and APIs for PHP developers - SXSW 2011
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Artificial intelligence base advance cyber attacks overview