Abstract
The ethical implications of incorporating artificial intelligence (AI) into cybersecurity procedures are examined severely in this study article. The study highlights the significance of addressing ethical questions to guarantee responsible and equitable use of this technology, as artificial intelligence (AI) plays an increasingly vital role in identifying, preventing, and mitigating cyber risks. The research work highlights the important applications of AI in cybersecurity, stressing its capacity to detect abnormalities, evaluate large datasets, and adapt to changing attack tactics. But as AI-driven cybersecurity solutions become more common, privacy-related ethical issues become more important. The study investigates the possible privacy infringements brought about by the comprehensive data collection and surveillance powers built into AI-powered security systems. It highlights how important it is to use AI to identify threats while also protecting customers’ personal information. The study also looks at moral concerns about the use of AI to cybersecurity globally. It addresses how AI systems in one country may have an impact on systems in other countries, emphasizing the need of maintaining international harmony, upholding standards, and averting damage or conflict in AI-related situations. In order to address global concerns, the report emphasizes the significance of ethical protections, widespread access to technology, and adherence to privacy and data protection legislation. The research work concludes by recommending a thorough strategy that gives privacy protection, bias mitigation, openness, and accountability top priority when incorporating AI into cybersecurity. The development and use of AI-powered cybersecurity solutions must be guided by continuing ethical concerns in order to ensure that these technologies uphold moral standards and enhance global digital security.
References
Ahmed F (2022) Ethical aspects of artificial intelligence in banking. J Res Econ Finance Manag 1:55–63. https://doi.org/10.56596/jrefm.v1i2.7
Johnson A, Grumbling E (eds) (2019) Implications of artificial intelligence for cybersecurity. National Academies Press, Washington, DC. https://doi.org/10.17226/25488
Martinho A, Herber N, Kroesen M, Chorus C (2021) Ethical issues in focus by the autonomous vehicles industry. Transp Rev 41:556–577. https://doi.org/10.1080/01441647.2020.1862355
Mirbabaie M, Hofeditz L, Frick NRJ, Stieglitz S (2022) Artificial intelligence in hospitals: providing a status quo of ethical considerations in academia to guide future research. AI Soc 37:1361–1382. https://doi.org/10.1007/s00146-021-01239-4
Dash B, Ansari MF, Sharma P, Ali A (2022) Threats and opportunities with AI-based cyber security intrusion detection: a review. Int J Softw Eng Appl 13:13–21. https://doi.org/10.5121/ijsea.2022.13502
Naik N, Hameed BMZ, Shetty DK, Swain D, Shah M, Paul R, Aggarwal K, Ibrahim S, Patil V, Smriti K, Shetty S, Rai BP, Chlosta P, Somani BK (2022) Legal and ethical consideration in artificial intelligence in healthcare: who takes responsibility? Front Surg 9. https://doi.org/10.3389/fsurg.2022.862322
Helkala K, Cook J, Lucas G, Pasquale F, Reichberg G, Syse H (2023) AI in cyber operations: ethical and legal considerations for end-users. In: Tuomo S, Kokkonen T (eds) Artificial intelligence and cybersecurity: theory and applications. Springer International Publishing, Cham, pp 185–206. https://doi.org/10.1007/978-3-031-15030-2_9
Rodrigues R (2020) Legal and human rights issues of AI: gaps, challenges and vulnerabilities. J Responsib Technol 4:100005. https://doi.org/10.1016/j.jrt.2020.100005
Al-Mansoori S, Salem MB (2023) The role of artificial intelligence and machine learning in shaping the future of cybersecurity: trends, applications, and ethical considerations. Int J Soc Anal 8:1–16
Wirtz BW, Weyerer JC, Geyer C (2019) Artificial intelligence and the public sector—applications and challenges. Int J Public Adm 42:596–615. https://doi.org/10.1080/01900692.2018.1498103
Walshe R, Koene A, Baumann S, Panella M, Maglaras L, Medeiros F (2021) Artificial intelligence as enabler for sustainable development. In: 2021 IEEE international conference on engineering, technology and innovation (ICE/ITMC), pp 1–7. https://doi.org/10.1109/ICE/ITMC52061.2021.9570215
Chaudhary H, Detroja A, Prajapati P, Shah P (2020) A review of various challenges in cybersecurity using artificial intelligence. In: 2020 3rd international conference on intelligent sustainable systems (ICISS), pp 829–836. https://doi.org/10.1109/ICISS49785.2020.9316003
Shaukat K, Luo S, Varadharajan V, Hameed IA, Xu M (2020) A survey on machine learning techniques for cyber security in the last decade. IEEE Access 8:222310–222354. https://doi.org/10.1109/ACCESS.2020.3041951
Timmers P (2019) Ethics of AI and cybersecurity when sovereignty is at stake. Minds Mach (Dordr) 29:635–645. https://doi.org/10.1007/s11023-019-09508-4
Romancheva NI (2021) Duality of artificial intelligence technologies in assessing cyber security risk. IOP Conf Ser Mater Sci Eng 1069:12004. https://doi.org/10.1088/1757-899X/1069/1/012004
Ferreyra NED, Aimeur E, Hage H, Heisel M, van Hoogstraten CG (2020) Persuasion meets AI: ethical considerations for the design of social engineering countermeasures. CoRR. abs/2009.12853
Christodoulou E, Iordanou K (2021) Democracy under attack: challenges of addressing ethical issues of AI and big data for more democratic digital media and societies. Front Polit Sci 3. https://doi.org/10.3389/fpos.2021.682945
Abdulllah SM (2019) Artificial intelligence (AI) and its associated ethical issues. ICR J 10:124–126. https://doi.org/10.52282/icr.v10i1.78
Zhang Z, Ning H, Shi F, Farha F, Xu Y, Xu J, Zhang F, Choo K-KR (2022) Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif Intell Rev 55:1029–1053. https://doi.org/10.1007/s10462-021-09976-0
Kim Y, Hakak S, Ghorbani A (2023) DDoS attack dataset (CICEV2023) against EV authentication in charging infrastructure. In: 2023 20th annual international conference on privacy, security and trust (PST). IEEE Computer Society, Los Alamitos, CA, pp 1–9. https://doi.org/10.1109/PST58708.2023.10320202
Lashkari AH, Kadir AFA, Taheri L, Ghorbani AA (2018) Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 international Carnahan conference on security technology (ICCST), pp 1–7. https://doi.org/10.1109/CCST.2018.8585560
Moustafa N, Creech G, Slay J (2018) Anomaly detection system using beta mixture models and outlier detection. In: Kumar PP, Rautaray SS (eds) Progress in computing, analytics and networking. Springer Singapore, Singapore, pp 125–135
Habibi Lashkari A, Kaur G, Rahali A (2021) DIDarknet: a contemporary approach to detect and characterize the darknet traffic using deep image learning. In: Proceedings of the 2020 10th international conference on communication and network security. Association for Computing Machinery, New York, NY, pp 1–13. https://doi.org/10.1145/3442520.3442521
Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSWNB15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp 1–6. https://doi.org/10.1109/MilCIS.2015.7348942
Koroniotis N, Moustafa N, Sitnikova E, Turnbull BP (2018) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. CoRR. abs/1811.00701
Valeros V, Garcia S (2022) Hornet 40: network dataset of geographically placed honeypots. Data Brief 40:107795. https://doi.org/10.1016/j.dib.2022.107795
Moustafa N, Creech G, Slay J (2018) Flow aggregator module for analysing network traffic. In: Kumar PP, Rautaray SS (eds) Progress in computing, analytics and networking. Springer Singapore, Singapore, pp 19–29
Ma J, Kulesza A, Dredze M, Crammer K, Saul L, Pereira F (2010) Exploiting feature covariance in high-dimensional online learning. In: Teh YW, Titterington M (eds) Proceedings of the thirteenth international conference on artificial intelligence and statistics. PMLR, Chia Laguna Resort, Sardinia, pp 493–500
Ma J, Saul LK, Savage S, Voelker GM (2009) Identifying suspicious URLs: an application of large-scale online learning. In: Proceedings of the 26th annual international conference on machine learning. Association for Computing Machinery, New York, NY, pp 681–688. https://doi.org/10.1145/1553374.1553462
Miettinen M, Marchal S, Hafeez I, Frassetto T, Asokan N, Sadeghi A-R, Tarkoma S (2017) IoT sentinel demo: automated device-type identification for security enforcement in IoT. In: Lee K, Liu L (eds) 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, pp 2511–2514. https://doi.org/10.1109/ICDCS.2017.284
Koroniotis N, Moustafa N (2020) Enhancing network forensics with particle swarm and deep learning: the particle deep framework. CoRR. abs/2005.00722
Koroniotis N, Moustafa N, Sitnikova E (2020) A new network forensic framework based on deep learning for internet of things networks: a particle deep framework. Future Gener Comput Syst 110:91–106. https://doi.org/10.1016/j.future.2020.03.042
Moustafa N, Slay J (2016) The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J: Glob Perspect 25:18–31. https://doi.org/10.1080/19393555.2015.1125974
Moustafa N, Creech G, Slay J (2017) Big data analytics for intrusion detection system: statistical decision-making using finite Dirichlet mixture models. In: Iván PC, Kalutarage HK (eds) Data analytics and decision support for cybersecurity: trends, methodologies and applications. Springer International Publishing, Cham, pp 127–156. https://doi.org/10.1007/978-3-319-59439-2_5
He Y, Luo C, Camacho RS, Wang K, Zhang H (2020) AI-based security attack pathway for cardiac medical diagnosis systems (CMDS). In: 2020 computing in cardiology, pp 1–4. https://doi.org/10.22489/CinC.2020.439
Lorenzo P, Stefano F, Ferreira A, Carolina P (2022) Artificial intelligence and cybersecurity: technology, governance and policy challenges. Centre for European Policy Studies (CEPS)
Gerke S, Minssen T, Cohen G (2020) Chapter 12—Ethical and legal challenges of artificial intelligence-driven healthcare. In: Bohr A, Memarzadeh K (eds) Artificial intelligence in healthcare. Academic Press, pp 295–336. https://doi.org/10.1016/B978-0-12-818438-7.00012-5
He Y, Efpraxia DZ, Yevseyeva I, Luo C (2023) Artificial intelligence-based ethical hacking for health information systems: simulation study. J Med Internet Res 25:e41748. https://doi.org/10.2196/41748
Cobianchi L, Verde JM, Loftus TJ, Piccolo D, Dal Mas F, Mascagni P, Garcia Vazquez A, Ansaloni L, Marseglia GR, Massaro M, Gallix B, Padoy N, Peter A, Kaafarani HM (2022) Artificial intelligence and surgery: ethical dilemmas and open issues. J Am Coll Surg 235
Sarker IH, Janicke H, Mohammad N, Watters P, Nepal S (2023) AI potentiality and awareness: a position paper from the perspective of human-AI teaming in cybersecurity
Flechais I, Chalhoub G (2023) Practical cybersecurity ethics: mapping CyBOK to ethical concerns
Jackson D, Matei SA, Bertino E (2023) Artificial intelligence ethics education in cybersecurity: challenges and opportunities: a focus group report
Ramya P, Babu SV, Venkatesan G (2023) Advancing cybersecurity with explainable artificial intelligence: a review of the latest research. In: 2023 5th international conference on inventive research in computing applications (ICIRCA), pp 1351–1357. https://doi.org/10.1109/ICIRCA57980.2023.10220797
Mohamed N (2023) Current trends in AI and ML for cybersecurity: a state-of-the-art survey. Cogent Eng 10:2272358. https://doi.org/10.1080/23311916.2023.2272358
Kumar S, Gupta U, Singh AK, Singh AK (2023) Artificial intelligence: revolutionizing cyber security in the digital era. J Comput Mech Manag 2:31–42. https://doi.org/10.57159/gadl.jcmm.2.3.23064
Santosh KC, Wall C (2022) AI and ethical issues. In: AI, ethical issues and explainability—applied biometrics. Springer Nature Singapore, Singapore, pp 1–20. https://doi.org/10.1007/978-981-19-3935-8_1
Alawida M, Mejri S, Mehmood A, Chikhaoui B, Isaac Abiodun O (2023) A comprehensive study of ChatGPT: advancements, limitations, and ethical considerations in natural language processing and cybersecurity. Information 14. https://doi.org/10.3390/info14080462
Kuzlu M, Fair C, Guler O (2021) Role of artificial intelligence in the internet of things (IoT) cybersecurity. Discov Internet Things 1:7. https://doi.org/10.1007/s43926-020-00001-4
Parul I, Thakur S (2021) Ethics and artificial intelligence: the pandora’s box. In: Parul I, Thakur S (eds) Artificial intelligence and ophthalmology: perks, perils and pitfalls. Springer Singapore, Singapore, pp 145–150. https://doi.org/10.1007/978-981-16-0634-2_11
Ashraf J, Keshk M, Moustafa N, Abdel-Basset M, Khurshid H, Bakhshi AD, Mostafa RR (2021) IoTBoT-IDS: a novel statistical learning-enabled botnet detection framework for protecting networks of smart cities. Sustain Cities Soc 72:103041. https://doi.org/10.1016/j.scs.2021.103041
Kalla D, Kuraku S (2023) Advantages, disadvantages and risks associated with ChatGPT and AI on cybersecurity. JETIR
Li F, Ruijs N, Lu Y (2023) Ethics & AI: a systematic review on ethical concerns and related strategies for designing with AI in healthcare. AI 4:28–53. https://doi.org/10.3390/ai4010003
Shasha Y, Carroll F (2021) Implications of AI in national security: understanding the security issues and ethical challenges. In: Reza M, Jahankhani H (eds) Artificial intelligence in cyber security: impact and implications: security challenges, technical and ethical issues, forensic investigative challenges. Springer International Publishing, Cham, pp 157–175. https://doi.org/10.1007/978-3-030-88040-8_6
Vakkuri V, Kemell KK, Abrahamsson P (2019) Implementing ethics in AI: initial results of an industrial multiple case study. In: Xavier F, Männistö T (eds) Product-focused software process improvement. Springer International Publishing, Cham, pp. 331–338
Dasawat SS, Sharma S (2023) Cyber security integration with smart new age sustainable startup business, risk management, automation and scaling system for entrepreneurs: an artificial intelligence approach. In: 2023 7th international conference on intelligent computing and control systems (ICICCS), pp 1357–1363. https://doi.org/10.1109/ICICCS56967.2023.10142779
Kaloudi N, Li J (2020) The AI-based cyber threat landscape: a survey. ACM Comput Surv 53. https://doi.org/10.1145/3372823
Du S, Xie C (2021) Paradoxes of artificial intelligence in consumer markets: ethical challenges and opportunities. J Bus Res 129:961–974. https://doi.org/10.1016/j.jbusres.2020.08.024
Sarker IH, Furhad MH, Nowrozy R (2021) AI-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Comput Sci 2:173. https://doi.org/10.1007/s42979-021-00557-0
Yildirim M (2021) Artificial intelligence-based solutions for cyber security problems. In: Luhach AK, Elçi A (eds) Artificial intelligence paradigms for smart cyber-physical systems. IGI Global, Hershey, PA, pp 68–86. https://doi.org/10.4018/978-1-7998-5101-1.ch004
Buzzanell PM (2023) Risk, resilience, and ethical considerations in artificial intelligence. Emerg Media 1:30–39. https://doi.org/10.1177/27523543231188274
Koroniotis N, Moustafa N, Schiliro F, Gauravaram P, Janicke H (2020) A holistic review of cybersecurity and reliability perspectives in smart airports. IEEE Access 8:209802–209834. https://doi.org/10.1109/ACCESS.2020.3036728
Guleria A, Krishan K, Sharma V, Kanchan T. ChatGPT: forensic, legal, and ethical issues. Med Sci Law 00258024231191829. https://doi.org/10.1177/00258024231191829
Morovat K, Panda B (2020) A survey of artificial intelligence in cyber-security. In: 2020 International conference on computational science and computational intelligence (CSCI), pp 109–115. https://doi.org/10.1109/CSCI51800.2020.00026
Garcia AB, Babiceanu RF, Seker R (2021) Artificial intelligence and machine learning approaches for aviation cybersecurity: an overview. In: 2021 integrated communications navigation and surveillance conference (ICNS), pp 1–8. https://doi.org/10.1109/ICNS52807.2021.9441594
Sharma I (2021) Evolution of unmanned aerial vehicles (UAVs) with machine learning. In: 2021 international conference on advances in technology, management & education (ICATME), pp 25–30. https://doi.org/10.1109/ICATME50232.2021.9732774
Ahmad OF, Stoyanov D, Lovat LB (2020) Barriers and pitfalls for artificial intelligence in gastroenterology: ethical and regulatory issues. Tech Innov Gastrointest Endosc 22:80–84. https://doi.org/10.1016/j.tgie.2019.150636
Stahl BC (2021) Ethical issues of AI. In: artificial intelligence for a better future: an ecosystem perspective on the ethics of AI and emerging digital technologies. Springer International Publishing, Cham, pp 35–53. https://doi.org/10.1007/978-3-030-69978-9_4
Soni VD. Challenges and solution for artificial intelligence in cybersecurity of the USA. Artif Intell Cybersecur USA 2
Kent AD. Cyber security data sources for dynamic network research. In: Dynamic networks and cyber-security, pp 37–65. https://doi.org/10.1142/9781786340757_0002
Sarhan M, Layeghy S, Moustafa N, Portmann M (2020) NetFlow datasets for machine learning-based network intrusion detection systems. CoRR. abs/2011.09144
Sharma I, Kaushik K. Chhabra G (2023) Augmenting transparency and reliability for national health insurance scheme with distributed ledger. In: 2023 4th international conference on electronics and sustainable communication systems (ICESC), pp 1399–1405. https://doi.org/10.1109/ICESC57686.2023.10193127
Nour M, Slay J (2018) A network forensic scheme using correntropy-variation for attack detection. In: Gilbert P, Shenoi S (eds) Advances in digital forensics XIV. Springer International Publishing, Cham, pp 225–239
Al-Hawawreh M, Moustafa N, Garg S, Hossain MS (2021) Deep learning-enabled threat intelligence scheme in the internet of things networks. IEEE Trans Netw Sci Eng 8:2968–2981. https://doi.org/10.1109/TNSE.2020.3032415
Miettinen M, Marchal S, Hafeez I, Asokan N, Sadeghi A-R, Tarkoma S (2017) IoT SENTINEL: automated device-type identification for security enforcement in IoT. In: Lee K, Liu L (eds) 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, pp 2177–2184. https://doi.org/10.1109/ICDCS.2017.283
Keshk M, Moustafa N, Sitnikova E, Creech G (2017) Privacy preservation intrusion detection technique for SCADA systems. In: 2017 military communications and information systems conference (MilCIS), pp 1–6. https://doi.org/10.1109/MilCIS.2017.8190422
Sharma I, Ramkumar KR (2017) A survey on ACO based multipath routing algorithms for ad hoc networks. Int J Pervasive Comput Commun 13:370–385. https://doi.org/10.1108/IJPCC-D-17-00015
Mamun MS, Rathore MA, Lashkari AH, Stakhanova N, Ghorbani AA (2016) Detecting malicious URLs using lexical analysis. In: Chen J, Piuri V (eds) Network and system security. Springer International Publishing, Cham, pp 467–482
Moustafa N, Misra G, Slay J (2021) Generalized outlier Gaussian mixture technique based on automated association features for simulating and detecting web application attacks. IEEE Trans Sustain Comput 6:245–256. https://doi.org/10.1109/TSUSC.2018.2808430
Ashraf J, Bakhshi AD, Moustafa N, Khurshid H, Javed A, Beheshti A (2021) Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Trans Intell Transp Syst 22:4507–4518. https://doi.org/10.1109/TITS.2020.3017882
Koroniotis N, Moustafa N, Sitnikova E, Slay J (2018) Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques. In: Hu J, Khalil I (eds) Mobile networks and management. Springer International Publishing, Cham, pp 30–44
Moustafa N, Keshk M, Choo K-KR, Lynar T, Camtepe S, Whitty M (2021) DAD: a distributed anomaly detection system using ensemble one-class statistical learning in edge networks. Future Gener Comput Syst 118:240–251. https://doi.org/10.1016/j.future.2021.01.011
GarcĂa S, Grill M, Stiborek J, Zunino A (2014) An empirical comparison of botnet detection methods. Comput Secur 45:100–123. https://doi.org/10.1016/j.cose.2014.05.011
Haider W, Moustafa N, Keshk M, Fernandez A, Choo K-KR, Wahab A (2020) FGMC-HADS: fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from Linux systems. Comput Secur 96:101906. https://doi.org/10.1016/j.cose.2020.101906
Weinger B, Kim J, Sim A, Nakashima M, Moustafa N, Wu KJ (2020) Enhancing IoT anomaly detection performance for federated learning. In: 2020 16th international conference on mobility, sensing and networking (MSN), pp 206–213. https://doi.org/10.1109/MSN50589.2020.00045
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Kaushik, K., Khan, A., Kumari, A., Sharma, I., Dubey, R. (2024). Ethical Considerations in AI-Based Cybersecurity. In: Kaushik, K., Sharma, I. (eds) Next-Generation Cybersecurity. Blockchain Technologies. Springer, Singapore. https://doi.org/10.1007/978-981-97-1249-6_19
Download citation
DOI: https://doi.org/10.1007/978-981-97-1249-6_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-1248-9
Online ISBN: 978-981-97-1249-6
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)