![人工智能對網絡威脅的近期影響(英文版)_第1頁](http://file4.renrendoc.com/view14/M05/1C/08/wKhkGWdlUUuACjYhAAJXbXf0CCk365.jpg)
![人工智能對網絡威脅的近期影響(英文版)_第2頁](http://file4.renrendoc.com/view14/M05/1C/08/wKhkGWdlUUuACjYhAAJXbXf0CCk3652.jpg)
![人工智能對網絡威脅的近期影響(英文版)_第3頁](http://file4.renrendoc.com/view14/M05/1C/08/wKhkGWdlUUuACjYhAAJXbXf0CCk3653.jpg)
![人工智能對網絡威脅的近期影響(英文版)_第4頁](http://file4.renrendoc.com/view14/M05/1C/08/wKhkGWdlUUuACjYhAAJXbXf0CCk3654.jpg)
![人工智能對網絡威脅的近期影響(英文版)_第5頁](http://file4.renrendoc.com/view14/M05/1C/08/wKhkGWdlUUuACjYhAAJXbXf0CCk3655.jpg)
版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
3/4/24,11:35AMThenear-termimpactofAIonthecyberthreat-NCSC.GOV.UK
Thenear-termimpactofAIonthecyberthreat
AnNCSCassessmentfocusingonhowAIwillimpacttheefficacyofcyber
operationsandtheimplicationsforthecyberthreatoverthenexttwoyears.
UKCyberPolicycomment
DuringtheBletchleyAISafetySummitinNovember2023,internationalleaderscame
togethertodiscussthevastpotentialofAImodelsinpromotingeconomicgrowth,
propellingscientificadvances,andprovidingawiderangeofpublicbenefits.TheyalsounderscoredthesecurityrisksthatcouldarisefromtheirresponsibledevelopmentanduseofAItechnologies.TheUKgovernmentisevaluatingandaddressingthepotentialthreatsandrisksassociatedwithAI.
WhileitisessentialtofocusontherisksposedbyAI,wemustalsoseizethesubstantialopportunitiesitpresentstocyberdefenders.Forexample,AIcanimprovethedetectionandtriageofcyberattacksandidentifymaliciousemailsandphishingcampaigns,
ultimatelymakingthemeasiertocounteract.
TheSummitDeclarationhighlightedtheimportanceofensuringthatAIisdesigned,
developed,deployed,andusedinamannerthatissafe,human-centric,trustworthy,andresponsibleforthebenefitofall.TheNCSCcontinuestoworkwithinternationalpartnersandindustrytoprovideguidanceonthesecuredevelopmentanduseofAI,sothatwe
canrealisethebenefitsthatAIofferstosociety,publishing
GuidelinesforSecureAI
SystemDevelopment
inNovember2023.
NCSCAssessment
NCSCAssessment(NCSC-A)istheauthoritativevoiceonthecyberthreattotheUK.Wefuseall-sourceinformation–classifiedintelligence,industryknowledge,academicmaterialandopensource–toprovideindependentkeyjudgementsthatinformpolicydecisionmakingandimproveUKcybersecurity.Wework
closelywithgovernment,industryandinternationalpartnersforexpertinputintoourassessments.
.uk/report/impact-of-ai-on-cyber-threat
1/8
3/4/24,11:35AMThenear-termimpactofAIonthecyberthreat-NCSC.GOV.UK
NCSC-AispartoftheProfessionalHeadsofIntelligenceAssessment(PHIA).PHIA
leadsthedevelopmentoftheprofessionthroughanalyticaltradecraft,professionalstandards,andbuildingandsustainingacross-governmentcommunity.
Thisreportusesformalprobabilisticlanguage(seeyardstick)fromNCSC-A
producttoinformreadersaboutthenear-termimpactonthecyberthreatfromAI.TolearnmoreaboutNCSC-A,pleasecontact
enquiries@.uk
.
Howlikelyisa'realisticpossibility'?
ProfessionalHeadofIntelligenceAssessment(PHIA)probabilityyardstick
NCSCAssessmentusesthePHIAprobabilityyardstickeverytimewemakeanassessment,judgement,orprediction.Thetermsusedcorrespondtothe
likelihoodrangesbelow:
Keyjudgements
·Artificialintelligence(AI)willalmostcertainlyincreasethevolumeandheightentheimpactofcyberattacksoverthenexttwoyears.However,theimpactonthecyberthreatwillbeuneven(
seetable1
).
.uk/report/impact-of-ai-on-cyber-threat
2/8
3/4/24,11:35AMThenear-termimpactofAIonthecyberthreat-NCSC.GOV.UK
·Thethreatto2025comesfromevolutionandenhancementofexistingtactics,techniquesandprocedures(TTPs).
·Alltypesofcyberthreatactor–stateandnon-state,skilledandlessskilled
–arealreadyusingAI,tovaryingdegrees.
·AIprovidescapabilityupliftinreconnaissanceandsocialengineering,
almostcertainlymakingbothmoreeffective,efficient,andhardertodetect.
·MoresophisticatedusesofAIincyberoperationsarehighlylikelytobe
restrictedtothreatactorswithaccesstoqualitytrainingdata,significantexpertise(inbothAIandcyber),andresources.Moreadvancedusesareunlikelytoberealisedbefore2025.
·AIwillalmostcertainlymakecyberattacksagainsttheUKmoreimpactful
becausethreatactorswillbeabletoanalyseexfiltrateddatafasterandmoreeffectively,anduseittotrainAImodels.
·AIlowersthebarrierfornovicecybercriminals,hackers-for-hireand
hacktiviststocarryouteffectiveaccessandinformationgathering
operations.Thisenhancedaccesswilllikelycontributetotheglobalransomwarethreatoverthenexttwoyears.
·Movingtowards2025andbeyond,commoditisationofAI-enabledcapabilityincriminalandcommercialmarketswillalmostcertainlymakeimproved
capabilityavailabletocybercrimeandstateactors.
Context
ThisassessmentfocusesonhowAIwillimpacttheeffectivenessofcyber
operationsandtheimplicationsforthecyberthreatoverthenexttwoyears.It
doesnotaddressthecybersecuritythreattoAItools,northecybersecurityrisksofincorporatingthemintosystemarchitecture.
TheassessmentassumesnosignificantbreakthroughintransformativeAIinthistimeperiod.Thisassumptionshouldbekeptunderreview,asanybreakthrough
couldhavesignificantimplicationsformalwareandzero-dayexploitdevelopmentandthereforethecyberthreat.
.uk/report/impact-of-ai-on-cyber-threat
3/8
3/4/24,11:35AMThenear-termimpactofAIonthecyberthreat-NCSC.GOV.UK
TheimpactofAIonthecyberthreatwillbeoffsetbytheuseofAItoenhance
cybersecurityresiliencethroughdetectionandimprovedsecuritybydesign.
MoreworkisrequiredtounderstandtheextenttowhichAIdevelopmentsincybersecuritywilllimitthethreatimpact.
Assessment
1.TheimpactofAIonthecyberthreatisuneven;bothintermsofitsusebycyberthreatactorsandintermsofupliftincapability.
2.Table1:ExtentofcapabilityupliftcausedbyAIovernexttwoyears.
.uk/report/impact-of-ai-on-cyber-threat
4/8
3/4/24,11:35AMThenear-termimpactofAIonthecyberthreat-NCSC.GOV.UK
Highlycapable
statethreatactors
Capablestateactors,commercialcompaniessellingtostates,
organisedcybercrime
groups
Less-skilledhackers-for-hire,opportunisticcybercriminals,
hacktivists
Intent
High
High
Opportunistic
Capability
HighlyskilledinAIandcyber,wellresourced
Skilledincyber,someresourceconstraints
Novicecyberskills,limitedresource
Reconnaissance
Moderateuplift
Moderateuplift
Uplift
Social
engineering,phishing,
passwords
Uplift
Uplift
Significantuplift(fromlowbase)
Tools(malware,exploits)
Realisticpossibilityofuplift
Minimaluplift
Moderateuplift(fromlowbase)
Lateralmovement
Minimaluplift
Minimaluplift
Nouplift
Exfiltration
Uplift
Uplift
Uplift
Implications
Bestplacedto
harnessAI'spotentialinadvancedcyber
operationsagainst
networks,forexampleuseinadvanced
malwaregeneration.
Mostcapabilityupliftinreconnaissance,socialengineeringand
exfiltration.WillproliferateAI-enabledtoolstonovicecyberactors.
Lowerbarriertoentrytoeffectiveandscalableaccessoperations-
increasingvolumeof
successfulcompromise
ofdevicesandaccounts.
KEY:MINIMALUPLIFT囚MODERATEUPLIFT囚UPLIFT囚SIGNIFICANTUPLIFT
3.AIwillprimarilyofferthreatactorscapabilityupliftinsocialengineering.
GenerativeAI(GenAI)canalreadybeusedtoenableconvincinginteractionwithvictims,includingthecreationofluredocuments,withoutthe
translation,spellingandgrammaticalmistakesthatoftenrevealphishing.Thiswillhighlylikelyincreaseoverthenexttwoyearsasmodelsevolveanduptakeincreases.
.uk/report/impact-of-ai-on-cyber-threat
5/8
3/4/24,11:35AMThenear-termimpactofAIonthecyberthreat-NCSC.GOV.UK
4.AI’sabilitytosummarisedataatpacewillalsohighlylikelyenablethreatactorstoidentifyhigh-valueassetsforexaminationandexfiltration,
enhancingthevalueandimpactofcyberattacksoverthenexttwoyears.
5.Threatactors,includingransomwareactors,arealreadyusingAItoincreasetheefficiencyandeffectivenessofaspectsofcyberoperations,suchas
reconnaissance,phishingandcoding.Thistrendwillalmostcertainly
continueto2025andbeyond.Phishing,typicallyaimedeitheratdelivering
malwareorstealingpasswordinformation,playsanimportantrolein
providingtheinitialnetworkaccessesthatcybercriminalsneedtocarryoutransomwareattacksorothercybercrime.Itisthereforelikelythatcyber
criminaluseofavailableAImodelstoimproveaccesswillcontributetotheglobalransomwarethreatinthenearterm.
6.AIislikelytoassistwithmalwareandexploitdevelopment,vulnerability
researchandlateralmovementbymakingexistingtechniquesmore
efficient.However,inthenearterm,theseareaswillcontinuetorelyon
humanexpertise,meaningthatanylimitedupliftwillhighlylikelyberestrictedtoexistingthreatactorsthatarealreadycapable.AIhasthepotentialto
generatemalwarethatcouldevadedetectionbycurrentsecurityfilters,butonlyifitistrainedonqualityexploitdata.Thereisarealisticpossibilitythat
highlycapablestateshaverepositoriesofmalwarethatarelargeenoughtoeffectivelytrainanAImodelforthispurpose.
7.Cyberresiliencechallengeswillbecomemoreacuteasthetechnology
develops.To2025,GenAIandlargelanguagemodels(LLMs)willmakeit
difficultforeveryone,regardlessoftheirlevelofcybersecurity
understanding,toassesswhetheranemailorpasswordresetrequestis
genuine,ortoidentifyphishing,spoofingorsocialengineeringattempts.Thetimebetweenreleaseofsecurityupdatestofixnewlyidentified
vulnerabilitiesandthreatactorsexploitingunpatchedsoftwareisalreadyreducing.Thishasexacerbatedthechallengefornetworkmanagersto
patchknownvulnerabilitiesbeforetheycanbeexploited.AIishighlylikelytoacceleratethischallengeasreconnaissancetoidentifyvulnerabledevicesbecomesquickerandmoreprecise.
8.Expertise,equipment,timeandfinancialresourcingarecurrentlycrucialtoharnessmoreadvancedusesofAIincyberoperations.Onlythosewho
.uk/report/impact-of-ai-on-cyber-threat
6/8
3/4/24,11:35AMThenear-termimpactofAIonthecyberthreat-NCSC.GOV.UK
investinAI,havetheresourcesandexpertise,andhaveaccesstoqualitydatawillbenefitfromitsuseinsophisticatedcyberattacksto2025.Highlycapablestateactorsarealmostcertainlybestplacedamongstcyber
threatactorstoharnessthepotentialofAIinadvancedcyberoperations.Otherstateactorsandmostcommercialcompaniesthatoffercapabilitytostatesworldwidewillgainmoderatecapabilityupliftoverthenext
eighteenmonthsinsocialengineering,reconnaissanceandexfiltration.Capableandestablishedcriminalgroupsarealsolikelytohaveenoughtrainingdataandresourcetogainsomeuplift.
9.However,itisarealisticpossibilitythatthesefactorsmaybecomeless
importantovertime,asmoresophisticatedAImodelsproliferateand
uptakeincreases.PubliclyavailableAImodelsalreadylargelyremovethe
needforactorstocreatetheirownreplicatechnologies,especiallyinlow-sophisticationoperationssuchasspear-phishing.Less-skilledcyberactorswillalmostcertainlybenefitfromsignificantcapabilityupliftsinthistypeofoperationto2025.Commoditisationofcybercrimecapability,forexample‘as-a-service’businessmodels,makesitalmostcertainthatcapable
groupswillmonetiseAI-enabledcybertools,makingimprovedcapabilityavailabletoanyonewillingtopay.
10.To2025,trainingAIonqualitydatawillremaincrucialforitseffectiveuseincyberoperations.Thescalingbarriersforautomatedreconnaissanceof
targets,socialengineeringandmalwareareallprimarilyrelatedtodata.Butto2025andbeyond,assuccessfulexfiltrationsoccur,thedatafeedingAIwillalmostcertainlyimprove,enablingfaster,moreprecisecyberoperations.
11.Increasesinthevolumeandheightenedcomplexityandimpactofcyber
operationswillindicatethatthreatactorshavebeenabletoeffectively
harnessAI.ThiswillhighlylikelyintensifyUKcyberresiliencechallengesintheneartermforUKgovernmentandtheprivatesector.
Glossary
Artificialintelligence
.uk/report/impact-of-ai-on-cyber-threat
7/8
3/4/24,11:35AMThenear-termimpactofAIonthecyberthreat-NCSC.GOV.UK
Computersystemswhichcanperformtasksusuallyrequiringhumanintelligence.Thiscouldin
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 現(xiàn)代科技在河道治理與生態(tài)修復中的應用
- 《解決問題的策略》(說課稿)-2024-2025學年四年級上冊數(shù)學蘇教版
- 環(huán)保型清潔能源技術進展及市場前景分析
- 現(xiàn)代服務業(yè)創(chuàng)新驅動的商業(yè)模式探索
- 校園網中的網絡通信協(xié)議與優(yōu)化實踐
- 生產過程中的環(huán)保因素甲基四氫苯酐成本探討
- 生態(tài)環(huán)境改善與老虎種群增長的關系研究
- 環(huán)保意識在生命教育中的重要性體現(xiàn)
- 七年級歷史上冊 第三單元 秦漢時期:統(tǒng)一多民族國家的建立和鞏固第11課 西漢建立和“文景之治”說課稿 新人教版
- 法律常識職場新人的防騙必修課
- 2024暑期夏日露營潮趣互動音樂節(jié)(唱享潮夏旋律季)活動策劃方案
- 臨床成人ICU患者外周動脈導管管理要點
- 2024年長沙衛(wèi)生職業(yè)學院單招職業(yè)適應性測試題庫及參考答案
- 死亡病例討論模板
- 《讓學生創(chuàng)造著長大》讀書心得
- 畢業(yè)旅游活動設計與實施方案
- 宜城安達特種水泥有限公司雙寨子礦區(qū)鋁土礦礦產資源開發(fā)利用與生態(tài)復綠方案
- 2024-2026招商信諾人壽中國健康指數(shù)白皮書
- 面向機器人柔順操作的力位精準控制方法
- 電梯日管控、周排查、月調度內容表格
- 七年級下冊英語單詞默寫表直接打印
評論
0/150
提交評論