Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 15 , Issue 1 , PP: 288-297, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

The Challenge of Adversarial Attacks on AI-Driven Cybersecurity Systems

M. N. V Kiranbabu 1 * , A. Jeraldine Viji 2 , Amit Kumar Chandanan 3 , Vijay Birchha 4 , Tushar Kumar Pandey 5 , Sumit Kumar Sar 6

  • 1 Associate Professor, Department of CSE, Koneru Lakshmaiah Education Foundation Vaddeswaram, AP, India - (mnvkiranbabu@gmail.com)
  • 2 Professor, Dept. of EEE, Mailam Engineering College, Villupuram, TN, India - (jeraldinevijieee@mailamengg.com)
  • 3 Associate Professor, Department of Computer Science and Engineering, Guru Ghasidas Vishwavidyalaya (A Central University), Bilaspur, (C G), India - (chandanan.amit@ggu.ac.in)
  • 4 Senior Assistant Professor, School of Computer Science Engineering and Artificial intelligence (SCAI), VIT-Bhopal University, India - (vijaybirchha@gmail.com)
  • 5 Assistant Professor (Computer Science), College of Community Science, Central Agricultural University, Tura, Meghalaya, India - (tusharkumarpandey@gmail.com)
  • 6 Assistant professor, Department of Computer Science and Engineering, Bhilai Institute of Technology Durg, Chhattisgarh, 491001, India - (sumitsar@gmail.com)
  • Doi: https://doi.org/10.54216/JCIM.150123

    Received: April 11, 2024 Revised: June 15, 2024 Accepted: August 11, 2024
    Abstract

    As AI is deployed increasingly in defensive systems, hostile assaults have increased. AI-driven defensive systems are vulnerable to attacks that exploit flaws. This article examines the approaches used to resist AI-based cybersecurity systems and their effects on security. This paper examines existing literature and case studies to demonstrate how attackers modify AI models. These include avoidance, poisoning, and data-driven assaults. It also considers data breaches, system failures, and unauthorized access if a hostile effort succeeds. The report recommends adversarial training, model testing, and input sanitization to address these issues. It also stresses the need for monitoring and updating AI algorithms to adapt to changing opponent tactics. This paper emphasizes the need to limit hostile strike threats using real-life examples and statistics. To defend AI-driven cybersecurity systems from complex threats, cybersecurity specialists, AI researchers, and policymakers must collaborate across domains. This article provides full guidance for cybersecurity and AI professionals. It describes the complex issues adversarial assaults create and proposes a flexible and robust architecture to safeguard AI-driven cybersecurity systems from emerging threats.

    Keywords :

    Adversarial attacks , AI-driven , cybersecurity systems , challenges , threats , vulnerabilities , defense mechanisms , data confidentiality , interdisciplinary collaboration , resilient framework

    References

    [1]       W. Stuxnet, "Stuxnet 2021," August-2021. [Online]. Available: https: // en. Wikipedia .org /wiki /stuxnet %202021.

    [2]       R. Langner, "Stuxnet: Dissecting a Cyberwarfare Weapon," IEEE Security and Privacy Magazine, vol. 9, no. 3, pp. 49–51, 2011.

    [3]       V. Roy. "An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things" Journal of Cybersecurity and Information Management, Vol. 12, No. 2, 2023, PP. 8-17.

    [4]       M. Muckin and S. C. Fitch, "A Threat-Driven Approach to Cyber Security," Lockheed Martin Corporation, MD, USA, 2014.

    [5]       U.N.R. Commission, "Cyber Security Programs for Nuclear Facilities," US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research, Rockville, MD, USA, 2010.

    [6]       R. M. Blank, "Guide for Conducting Risk Assessments," CreateSpace Independent Publishing Platform, Scotts Valley, CA, US, 2011.

    [7]       Sujeetha Devi, Bhagyalakshmi L and Sanjay Kumar Suman, “Enhancing the Performance of Wireless Sensor Networks through Clustering and Joint Routing with Mobile Sink”, International Journal of Engineering and Advanced Technology, vol. 8, issue 6, pp. 323-327, 2019

    [8]       L. Bhagyalakshmi, Sanjay Kumar Suman, S. Mohanalakshmi, and Satyanand Singh, “Improving Spectral Efficiency and Coverage Capacity of 5G Networks: A Review”, Advances in mathematics: scientific journal, vol.9, no. 6, pp. 3387-3397, 2020.

    [9]       Vanita Jain , Mahima Swami , Rishab Bansal, Exploratory Data Analysis on Username-Password Dataset, Fusion: Practice and Applications, Vol. 4 , No. 1 , (2021) : 5-14 (Doi   :  https://doi.org/10.54216/FPA.040101)

    [10]    Aman Jain , Jatin Gupta , Somya Khandelwal , Surinder Kaur, Vehicle License Plate Recognition, Fusion: Practice and Applications, Vol. 4 , No. 1 , (2021) : 15-21 (Doi   :  https://doi.org/10.54216/FPA.040102)

    [11]    S. Song, M. Lee, T. Kim, C. Park, S. Park, and H. Kim, "A Case Study on Cyber-Security Program for the Programmable Logic Controller of Modern NPPs," IAEA, Vienna, Austria, 2014.

    [12]    J.-G. Song et al., "An Analysis of Technical Security Control Requirements for Digital I&C Systems in Nuclear Power Plants," Nuclear Engineering and Technology, vol. 45, no. 5, pp. 637–652, 2013.

    [13]    J.-C. Loh et al., "On the Invisibility and Anonymity of Undeniable Signature Schemes," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 11, pp. 18–34, 2020.

    [14]    Abhishta et al., "Why Would We Get Attacked? An Analysis of Attacker’s Aims Behind DDoS Attacks," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 11, pp. 3–22, 2020.

    [15]    Puneet Kaushal , Subash Chander , Vijay Kumar Sinha, Virtual Machine Placement in Cloud Computing: Challenges, Research Gaps, and Future, International Journal of Wireless and Ad Hoc Communication, Vol. 3 , No. 2 , (2021) : 64-71 (Doi   :  https://doi.org/10.54216/IJWAC.030202)

    [16]    Lobna Osman, Evaluating the Performance of Battery Electric Vehicles using an Incorporated Decision Support Framework Based on Ranking Algorithms, International Journal of Wireless and Ad Hoc Communication, Vol. 3 , No. 2 , (2021) : 72-90 (Doi   :  https://doi.org/10.54216/IJWAC.030203)

    [17]    H. P. Sahu, "FINE_DENSEIGANET: Automatic Medical Image Classification in Chest CT Scan Using Hybrid Deep Learning .Framework," International Journal of Image and Graphics [Preprint], 2023. [Online]. Available: https://doi.org/10.1142/s0219467825500044.

    [18]    Ibrahim Elhenawy , Salwa H. Mahmoud , Ahmed Moustafa, A Lightweight Privacy Preserving Keyword Search Over Encrypted Data in Cloud Computing, Journal of Cybersecurity and Information Management, Vol. 3 , No. 2 , (2020) : 29-41 (Doi   :  https://doi.org/10.54216/JCIM.030201)

    [19]    G. McGraw, "Software Security," IEEE Security and Privacy Magazine, vol. 2, no. 2, pp. 80–83, 2004.O. Clasp, "OWASP CLASP Project," 2015.

    [20]    F. Valenza and M. Cheminod, "An Optimized Firewall Anomaly Resolution," Journal of Internet Services and Information Security (JISIS), vol. 10, pp. 22–37, 2020.

    [21]    Noora Hani Sherif, Eay Fahidhil, Najlaa Nsrulaah Faris, Hussein Alaa Diame, Raaid Alubady, Seifedine Kadry, Modeling Sports Event Tasks in Augmentative and Alternative Communication Using Deep Learning,  Journal of Intelligent Systems and Internet of Things,  Vol. 9 ,  No. 2 ,  (2023) : 93-107 (Doi   :  https://doi.org/10.54216/JISIoT.090207)

    [22]    Hussein Alaa Diame, Waleed Hameed, Zainab.R.Abdulsada, Noora Hani Sherif, Noor Hanoon Haroon, Narjes Benameur, M. A. Burhanuddin,  Machine Learning Based Logistic Decision Support System for Intelligent Vehicles and Transportation Systems,  Journal of Intelligent Systems and Internet of Things,  Vol. 9 ,  No. 2 ,  (2023) : 108-119 (Doi   :  https://doi.org/10.54216/JISIoT.090208)

    [23]    Pooja , Dr. Manish Kumar Mukhija , Satish Kumar Alaria, Smart City's Security Model for Management of Image Data on Cloud, Journal of Cognitive Human-Computer Interaction, Vol. 2 , No. 1 , (2022) : 8-14 (Doi   :  https://doi.org/10.54216/JCHCI.020101)

    [24]    S.P. Samyuktha , Dr.P. Kavitha , V.A Kshaya , P. Shalini , R. Ramya, A Survey on Cyber Security Meets Artificial Intelligence: AI– Driven Cyber Security, Journal of Cognitive Human-Computer Interaction, Vol. 2 , No. 2 , (2022) : 50-55 (Doi   :  https://doi.org/10.54216/JCHCI.020202)

    [25]    Dwivedi, A., Agarwal, R., & Shukla, P. K. (2023, July). Enhancing Anonymity of Internet of Vehicle Identities in Connected Vehicle Security Services Using Batch Verification Algorithm. In International Conference on Data Science and Applications (pp. 323-335). Singapore: Springer Nature Singapore.

    [26]    Khare, A., Gupta, R., & Shukla, P. K. (2022). Improving the protection of wireless sensor network using a black hole optimization algorithm (BHOA) on best feasible node capture attack. In IoT and Analytics for Sensor Networks: Proceedings of ICWSNUCA 2021 (pp. 333-343). Springer Singapore.

    [27]    Reddy Gantla, H., Ahmad, S. S., Matroud, A., Kalhotra, S. K., Agarwal, I., Gupta, S., & Mamodiya, U. (2023, November). Machine Learning-Based Trust-Aware Secure TrafficMechanism to Identify DDOS Attacks over Cloud. In Proceedings of the 5th International Conference on Information Management & Machine Intelligence (pp. 1-7).

    [28]    Kumar, S., Dubey, K. K., Gautam, A. K., Verma, S., Kumar, V., & Mamodiya, U. (2022). Detection of recurring vulnerabilities in computing services. Journal of Discrete Mathematical Sciences and Cryptography, 25(4), 1063-1071.

    Cite This Article As :
    N., M.. , Jeraldine, A.. , Kumar, Amit. , Birchha, Vijay. , Kumar, Tushar. , Kumar, Sumit. The Challenge of Adversarial Attacks on AI-Driven Cybersecurity Systems. Journal of Cybersecurity and Information Management, vol. , no. , 2025, pp. 288-297. DOI: https://doi.org/10.54216/JCIM.150123
    N., M. Jeraldine, A. Kumar, A. Birchha, V. Kumar, T. Kumar, S. (2025). The Challenge of Adversarial Attacks on AI-Driven Cybersecurity Systems. Journal of Cybersecurity and Information Management, (), 288-297. DOI: https://doi.org/10.54216/JCIM.150123
    N., M.. Jeraldine, A.. Kumar, Amit. Birchha, Vijay. Kumar, Tushar. Kumar, Sumit. The Challenge of Adversarial Attacks on AI-Driven Cybersecurity Systems. Journal of Cybersecurity and Information Management , no. (2025): 288-297. DOI: https://doi.org/10.54216/JCIM.150123
    N., M. , Jeraldine, A. , Kumar, A. , Birchha, V. , Kumar, T. , Kumar, S. (2025) . The Challenge of Adversarial Attacks on AI-Driven Cybersecurity Systems. Journal of Cybersecurity and Information Management , () , 288-297 . DOI: https://doi.org/10.54216/JCIM.150123
    N. M. , Jeraldine A. , Kumar A. , Birchha V. , Kumar T. , Kumar S. [2025]. The Challenge of Adversarial Attacks on AI-Driven Cybersecurity Systems. Journal of Cybersecurity and Information Management. (): 288-297. DOI: https://doi.org/10.54216/JCIM.150123
    N., M. Jeraldine, A. Kumar, A. Birchha, V. Kumar, T. Kumar, S. "The Challenge of Adversarial Attacks on AI-Driven Cybersecurity Systems," Journal of Cybersecurity and Information Management, vol. , no. , pp. 288-297, 2025. DOI: https://doi.org/10.54216/JCIM.150123