Skip to main content

Ethical Considerations in AI-Based Cybersecurity

  • Chapter
  • First Online:
Next-Generation Cybersecurity

Part of the book series: Blockchain Technologies ((BT))

  • 75 Accesses

Abstract

The ethical implications of incorporating artificial intelligence (AI) into cybersecurity procedures are examined severely in this study article. The study highlights the significance of addressing ethical questions to guarantee responsible and equitable use of this technology, as artificial intelligence (AI) plays an increasingly vital role in identifying, preventing, and mitigating cyber risks. The research work highlights the important applications of AI in cybersecurity, stressing its capacity to detect abnormalities, evaluate large datasets, and adapt to changing attack tactics. But as AI-driven cybersecurity solutions become more common, privacy-related ethical issues become more important. The study investigates the possible privacy infringements brought about by the comprehensive data collection and surveillance powers built into AI-powered security systems. It highlights how important it is to use AI to identify threats while also protecting customers’ personal information. The study also looks at moral concerns about the use of AI to cybersecurity globally. It addresses how AI systems in one country may have an impact on systems in other countries, emphasizing the need of maintaining international harmony, upholding standards, and averting damage or conflict in AI-related situations. In order to address global concerns, the report emphasizes the significance of ethical protections, widespread access to technology, and adherence to privacy and data protection legislation. The research work concludes by recommending a thorough strategy that gives privacy protection, bias mitigation, openness, and accountability top priority when incorporating AI into cybersecurity. The development and use of AI-powered cybersecurity solutions must be guided by continuing ethical concerns in order to ensure that these technologies uphold moral standards and enhance global digital security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Ahmed F (2022) Ethical aspects of artificial intelligence in banking. J Res Econ Finance Manag 1:55–63. https://doi.org/10.56596/jrefm.v1i2.7

  2. Johnson A, Grumbling E (eds) (2019) Implications of artificial intelligence for cybersecurity. National Academies Press, Washington, DC. https://doi.org/10.17226/25488

  3. Martinho A, Herber N, Kroesen M, Chorus C (2021) Ethical issues in focus by the autonomous vehicles industry. Transp Rev 41:556–577. https://doi.org/10.1080/01441647.2020.1862355

  4. Mirbabaie M, Hofeditz L, Frick NRJ, Stieglitz S (2022) Artificial intelligence in hospitals: providing a status quo of ethical considerations in academia to guide future research. AI Soc 37:1361–1382. https://doi.org/10.1007/s00146-021-01239-4

    Article  Google Scholar 

  5. Dash B, Ansari MF, Sharma P, Ali A (2022) Threats and opportunities with AI-based cyber security intrusion detection: a review. Int J Softw Eng Appl 13:13–21. https://doi.org/10.5121/ijsea.2022.13502

    Article  Google Scholar 

  6. Naik N, Hameed BMZ, Shetty DK, Swain D, Shah M, Paul R, Aggarwal K, Ibrahim S, Patil V, Smriti K, Shetty S, Rai BP, Chlosta P, Somani BK (2022) Legal and ethical consideration in artificial intelligence in healthcare: who takes responsibility? Front Surg 9. https://doi.org/10.3389/fsurg.2022.862322

  7. Helkala K, Cook J, Lucas G, Pasquale F, Reichberg G, Syse H (2023) AI in cyber operations: ethical and legal considerations for end-users. In: Tuomo S, Kokkonen T (eds) Artificial intelligence and cybersecurity: theory and applications. Springer International Publishing, Cham, pp 185–206. https://doi.org/10.1007/978-3-031-15030-2_9

  8. Rodrigues R (2020) Legal and human rights issues of AI: gaps, challenges and vulnerabilities. J Responsib Technol 4:100005. https://doi.org/10.1016/j.jrt.2020.100005

  9. Al-Mansoori S, Salem MB (2023) The role of artificial intelligence and machine learning in shaping the future of cybersecurity: trends, applications, and ethical considerations. Int J Soc Anal 8:1–16

    Google Scholar 

  10. Wirtz BW, Weyerer JC, Geyer C (2019) Artificial intelligence and the public sector—applications and challenges. Int J Public Adm 42:596–615. https://doi.org/10.1080/01900692.2018.1498103

  11. Walshe R, Koene A, Baumann S, Panella M, Maglaras L, Medeiros F (2021) Artificial intelligence as enabler for sustainable development. In: 2021 IEEE international conference on engineering, technology and innovation (ICE/ITMC), pp 1–7. https://doi.org/10.1109/ICE/ITMC52061.2021.9570215

  12. Chaudhary H, Detroja A, Prajapati P, Shah P (2020) A review of various challenges in cybersecurity using artificial intelligence. In: 2020 3rd international conference on intelligent sustainable systems (ICISS), pp 829–836. https://doi.org/10.1109/ICISS49785.2020.9316003

  13. Shaukat K, Luo S, Varadharajan V, Hameed IA, Xu M (2020) A survey on machine learning techniques for cyber security in the last decade. IEEE Access 8:222310–222354. https://doi.org/10.1109/ACCESS.2020.3041951

    Article  Google Scholar 

  14. Timmers P (2019) Ethics of AI and cybersecurity when sovereignty is at stake. Minds Mach (Dordr) 29:635–645. https://doi.org/10.1007/s11023-019-09508-4

    Article  Google Scholar 

  15. Romancheva NI (2021) Duality of artificial intelligence technologies in assessing cyber security risk. IOP Conf Ser Mater Sci Eng 1069:12004. https://doi.org/10.1088/1757-899X/1069/1/012004

    Article  Google Scholar 

  16. Ferreyra NED, Aimeur E, Hage H, Heisel M, van Hoogstraten CG (2020) Persuasion meets AI: ethical considerations for the design of social engineering countermeasures. CoRR. abs/2009.12853

    Google Scholar 

  17. Christodoulou E, Iordanou K (2021) Democracy under attack: challenges of addressing ethical issues of AI and big data for more democratic digital media and societies. Front Polit Sci 3. https://doi.org/10.3389/fpos.2021.682945

  18. Abdulllah SM (2019) Artificial intelligence (AI) and its associated ethical issues. ICR J 10:124–126. https://doi.org/10.52282/icr.v10i1.78

  19. Zhang Z, Ning H, Shi F, Farha F, Xu Y, Xu J, Zhang F, Choo K-KR (2022) Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif Intell Rev 55:1029–1053. https://doi.org/10.1007/s10462-021-09976-0

    Article  Google Scholar 

  20. Kim Y, Hakak S, Ghorbani A (2023) DDoS attack dataset (CICEV2023) against EV authentication in charging infrastructure. In: 2023 20th annual international conference on privacy, security and trust (PST). IEEE Computer Society, Los Alamitos, CA, pp 1–9. https://doi.org/10.1109/PST58708.2023.10320202

  21. Lashkari AH, Kadir AFA, Taheri L, Ghorbani AA (2018) Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 international Carnahan conference on security technology (ICCST), pp 1–7. https://doi.org/10.1109/CCST.2018.8585560

  22. Moustafa N, Creech G, Slay J (2018) Anomaly detection system using beta mixture models and outlier detection. In: Kumar PP, Rautaray SS (eds) Progress in computing, analytics and networking. Springer Singapore, Singapore, pp 125–135

    Google Scholar 

  23. Habibi Lashkari A, Kaur G, Rahali A (2021) DIDarknet: a contemporary approach to detect and characterize the darknet traffic using deep image learning. In: Proceedings of the 2020 10th international conference on communication and network security. Association for Computing Machinery, New York, NY, pp 1–13. https://doi.org/10.1145/3442520.3442521

  24. Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSWNB15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp 1–6. https://doi.org/10.1109/MilCIS.2015.7348942

  25. Koroniotis N, Moustafa N, Sitnikova E, Turnbull BP (2018) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. CoRR. abs/1811.00701

    Google Scholar 

  26. Valeros V, Garcia S (2022) Hornet 40: network dataset of geographically placed honeypots. Data Brief 40:107795. https://doi.org/10.1016/j.dib.2022.107795

  27. Moustafa N, Creech G, Slay J (2018) Flow aggregator module for analysing network traffic. In: Kumar PP, Rautaray SS (eds) Progress in computing, analytics and networking. Springer Singapore, Singapore, pp 19–29

    Google Scholar 

  28. Ma J, Kulesza A, Dredze M, Crammer K, Saul L, Pereira F (2010) Exploiting feature covariance in high-dimensional online learning. In: Teh YW, Titterington M (eds) Proceedings of the thirteenth international conference on artificial intelligence and statistics. PMLR, Chia Laguna Resort, Sardinia, pp 493–500

    Google Scholar 

  29. Ma J, Saul LK, Savage S, Voelker GM (2009) Identifying suspicious URLs: an application of large-scale online learning. In: Proceedings of the 26th annual international conference on machine learning. Association for Computing Machinery, New York, NY, pp 681–688. https://doi.org/10.1145/1553374.1553462

  30. Miettinen M, Marchal S, Hafeez I, Frassetto T, Asokan N, Sadeghi A-R, Tarkoma S (2017) IoT sentinel demo: automated device-type identification for security enforcement in IoT. In: Lee K, Liu L (eds) 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, pp 2511–2514. https://doi.org/10.1109/ICDCS.2017.284

  31. Koroniotis N, Moustafa N (2020) Enhancing network forensics with particle swarm and deep learning: the particle deep framework. CoRR. abs/2005.00722

    Google Scholar 

  32. Koroniotis N, Moustafa N, Sitnikova E (2020) A new network forensic framework based on deep learning for internet of things networks: a particle deep framework. Future Gener Comput Syst 110:91–106. https://doi.org/10.1016/j.future.2020.03.042

  33. Moustafa N, Slay J (2016) The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J: Glob Perspect 25:18–31. https://doi.org/10.1080/19393555.2015.1125974

    Article  Google Scholar 

  34. Moustafa N, Creech G, Slay J (2017) Big data analytics for intrusion detection system: statistical decision-making using finite Dirichlet mixture models. In: Iván PC, Kalutarage HK (eds) Data analytics and decision support for cybersecurity: trends, methodologies and applications. Springer International Publishing, Cham, pp 127–156. https://doi.org/10.1007/978-3-319-59439-2_5

  35. He Y, Luo C, Camacho RS, Wang K, Zhang H (2020) AI-based security attack pathway for cardiac medical diagnosis systems (CMDS). In: 2020 computing in cardiology, pp 1–4. https://doi.org/10.22489/CinC.2020.439

  36. Lorenzo P, Stefano F, Ferreira A, Carolina P (2022) Artificial intelligence and cybersecurity: technology, governance and policy challenges. Centre for European Policy Studies (CEPS)

    Google Scholar 

  37. Gerke S, Minssen T, Cohen G (2020) Chapter 12—Ethical and legal challenges of artificial intelligence-driven healthcare. In: Bohr A, Memarzadeh K (eds) Artificial intelligence in healthcare. Academic Press, pp 295–336. https://doi.org/10.1016/B978-0-12-818438-7.00012-5

  38. He Y, Efpraxia DZ, Yevseyeva I, Luo C (2023) Artificial intelligence-based ethical hacking for health information systems: simulation study. J Med Internet Res 25:e41748. https://doi.org/10.2196/41748

  39. Cobianchi L, Verde JM, Loftus TJ, Piccolo D, Dal Mas F, Mascagni P, Garcia Vazquez A, Ansaloni L, Marseglia GR, Massaro M, Gallix B, Padoy N, Peter A, Kaafarani HM (2022) Artificial intelligence and surgery: ethical dilemmas and open issues. J Am Coll Surg 235

    Google Scholar 

  40. Sarker IH, Janicke H, Mohammad N, Watters P, Nepal S (2023) AI potentiality and awareness: a position paper from the perspective of human-AI teaming in cybersecurity

    Google Scholar 

  41. Flechais I, Chalhoub G (2023) Practical cybersecurity ethics: mapping CyBOK to ethical concerns

    Google Scholar 

  42. Jackson D, Matei SA, Bertino E (2023) Artificial intelligence ethics education in cybersecurity: challenges and opportunities: a focus group report

    Google Scholar 

  43. Ramya P, Babu SV, Venkatesan G (2023) Advancing cybersecurity with explainable artificial intelligence: a review of the latest research. In: 2023 5th international conference on inventive research in computing applications (ICIRCA), pp 1351–1357. https://doi.org/10.1109/ICIRCA57980.2023.10220797

  44. Mohamed N (2023) Current trends in AI and ML for cybersecurity: a state-of-the-art survey. Cogent Eng 10:2272358. https://doi.org/10.1080/23311916.2023.2272358

    Article  Google Scholar 

  45. Kumar S, Gupta U, Singh AK, Singh AK (2023) Artificial intelligence: revolutionizing cyber security in the digital era. J Comput Mech Manag 2:31–42. https://doi.org/10.57159/gadl.jcmm.2.3.23064

  46. Santosh KC, Wall C (2022) AI and ethical issues. In: AI, ethical issues and explainability—applied biometrics. Springer Nature Singapore, Singapore, pp 1–20. https://doi.org/10.1007/978-981-19-3935-8_1

  47. Alawida M, Mejri S, Mehmood A, Chikhaoui B, Isaac Abiodun O (2023) A comprehensive study of ChatGPT: advancements, limitations, and ethical considerations in natural language processing and cybersecurity. Information 14. https://doi.org/10.3390/info14080462

  48. Kuzlu M, Fair C, Guler O (2021) Role of artificial intelligence in the internet of things (IoT) cybersecurity. Discov Internet Things 1:7. https://doi.org/10.1007/s43926-020-00001-4

    Article  Google Scholar 

  49. Parul I, Thakur S (2021) Ethics and artificial intelligence: the pandora’s box. In: Parul I, Thakur S (eds) Artificial intelligence and ophthalmology: perks, perils and pitfalls. Springer Singapore, Singapore, pp 145–150. https://doi.org/10.1007/978-981-16-0634-2_11

  50. Ashraf J, Keshk M, Moustafa N, Abdel-Basset M, Khurshid H, Bakhshi AD, Mostafa RR (2021) IoTBoT-IDS: a novel statistical learning-enabled botnet detection framework for protecting networks of smart cities. Sustain Cities Soc 72:103041. https://doi.org/10.1016/j.scs.2021.103041

  51. Kalla D, Kuraku S (2023) Advantages, disadvantages and risks associated with ChatGPT and AI on cybersecurity. JETIR

    Google Scholar 

  52. Li F, Ruijs N, Lu Y (2023) Ethics & AI: a systematic review on ethical concerns and related strategies for designing with AI in healthcare. AI 4:28–53. https://doi.org/10.3390/ai4010003

    Article  Google Scholar 

  53. Shasha Y, Carroll F (2021) Implications of AI in national security: understanding the security issues and ethical challenges. In: Reza M, Jahankhani H (eds) Artificial intelligence in cyber security: impact and implications: security challenges, technical and ethical issues, forensic investigative challenges. Springer International Publishing, Cham, pp 157–175. https://doi.org/10.1007/978-3-030-88040-8_6

  54. Vakkuri V, Kemell KK, Abrahamsson P (2019) Implementing ethics in AI: initial results of an industrial multiple case study. In: Xavier F, Männistö T (eds) Product-focused software process improvement. Springer International Publishing, Cham, pp. 331–338

    Google Scholar 

  55. Dasawat SS, Sharma S (2023) Cyber security integration with smart new age sustainable startup business, risk management, automation and scaling system for entrepreneurs: an artificial intelligence approach. In: 2023 7th international conference on intelligent computing and control systems (ICICCS), pp 1357–1363. https://doi.org/10.1109/ICICCS56967.2023.10142779

  56. Kaloudi N, Li J (2020) The AI-based cyber threat landscape: a survey. ACM Comput Surv 53. https://doi.org/10.1145/3372823

  57. Du S, Xie C (2021) Paradoxes of artificial intelligence in consumer markets: ethical challenges and opportunities. J Bus Res 129:961–974. https://doi.org/10.1016/j.jbusres.2020.08.024

  58. Sarker IH, Furhad MH, Nowrozy R (2021) AI-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Comput Sci 2:173. https://doi.org/10.1007/s42979-021-00557-0

    Article  Google Scholar 

  59. Yildirim M (2021) Artificial intelligence-based solutions for cyber security problems. In: Luhach AK, Elçi A (eds) Artificial intelligence paradigms for smart cyber-physical systems. IGI Global, Hershey, PA, pp 68–86. https://doi.org/10.4018/978-1-7998-5101-1.ch004

  60. Buzzanell PM (2023) Risk, resilience, and ethical considerations in artificial intelligence. Emerg Media 1:30–39. https://doi.org/10.1177/27523543231188274

    Article  Google Scholar 

  61. Koroniotis N, Moustafa N, Schiliro F, Gauravaram P, Janicke H (2020) A holistic review of cybersecurity and reliability perspectives in smart airports. IEEE Access 8:209802–209834. https://doi.org/10.1109/ACCESS.2020.3036728

    Article  Google Scholar 

  62. Guleria A, Krishan K, Sharma V, Kanchan T. ChatGPT: forensic, legal, and ethical issues. Med Sci Law 00258024231191829. https://doi.org/10.1177/00258024231191829

  63. Morovat K, Panda B (2020) A survey of artificial intelligence in cyber-security. In: 2020 International conference on computational science and computational intelligence (CSCI), pp 109–115. https://doi.org/10.1109/CSCI51800.2020.00026

  64. Garcia AB, Babiceanu RF, Seker R (2021) Artificial intelligence and machine learning approaches for aviation cybersecurity: an overview. In: 2021 integrated communications navigation and surveillance conference (ICNS), pp 1–8. https://doi.org/10.1109/ICNS52807.2021.9441594

  65. Sharma I (2021) Evolution of unmanned aerial vehicles (UAVs) with machine learning. In: 2021 international conference on advances in technology, management & education (ICATME), pp 25–30. https://doi.org/10.1109/ICATME50232.2021.9732774

  66. Ahmad OF, Stoyanov D, Lovat LB (2020) Barriers and pitfalls for artificial intelligence in gastroenterology: ethical and regulatory issues. Tech Innov Gastrointest Endosc 22:80–84. https://doi.org/10.1016/j.tgie.2019.150636

  67. Stahl BC (2021) Ethical issues of AI. In: artificial intelligence for a better future: an ecosystem perspective on the ethics of AI and emerging digital technologies. Springer International Publishing, Cham, pp 35–53. https://doi.org/10.1007/978-3-030-69978-9_4

  68. Soni VD. Challenges and solution for artificial intelligence in cybersecurity of the USA. Artif Intell Cybersecur USA 2

    Google Scholar 

  69. Kent AD. Cyber security data sources for dynamic network research. In: Dynamic networks and cyber-security, pp 37–65. https://doi.org/10.1142/9781786340757_0002

  70. Sarhan M, Layeghy S, Moustafa N, Portmann M (2020) NetFlow datasets for machine learning-based network intrusion detection systems. CoRR. abs/2011.09144

    Google Scholar 

  71. Sharma I, Kaushik K. Chhabra G (2023) Augmenting transparency and reliability for national health insurance scheme with distributed ledger. In: 2023 4th international conference on electronics and sustainable communication systems (ICESC), pp 1399–1405. https://doi.org/10.1109/ICESC57686.2023.10193127

  72. Nour M, Slay J (2018) A network forensic scheme using correntropy-variation for attack detection. In: Gilbert P, Shenoi S (eds) Advances in digital forensics XIV. Springer International Publishing, Cham, pp 225–239

    Google Scholar 

  73. Al-Hawawreh M, Moustafa N, Garg S, Hossain MS (2021) Deep learning-enabled threat intelligence scheme in the internet of things networks. IEEE Trans Netw Sci Eng 8:2968–2981. https://doi.org/10.1109/TNSE.2020.3032415

    Article  Google Scholar 

  74. Miettinen M, Marchal S, Hafeez I, Asokan N, Sadeghi A-R, Tarkoma S (2017) IoT SENTINEL: automated device-type identification for security enforcement in IoT. In: Lee K, Liu L (eds) 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, pp 2177–2184. https://doi.org/10.1109/ICDCS.2017.283

  75. Keshk M, Moustafa N, Sitnikova E, Creech G (2017) Privacy preservation intrusion detection technique for SCADA systems. In: 2017 military communications and information systems conference (MilCIS), pp 1–6. https://doi.org/10.1109/MilCIS.2017.8190422

  76. Sharma I, Ramkumar KR (2017) A survey on ACO based multipath routing algorithms for ad hoc networks. Int J Pervasive Comput Commun 13:370–385. https://doi.org/10.1108/IJPCC-D-17-00015

    Article  Google Scholar 

  77. Mamun MS, Rathore MA, Lashkari AH, Stakhanova N, Ghorbani AA (2016) Detecting malicious URLs using lexical analysis. In: Chen J, Piuri V (eds) Network and system security. Springer International Publishing, Cham, pp 467–482

    Google Scholar 

  78. Moustafa N, Misra G, Slay J (2021) Generalized outlier Gaussian mixture technique based on automated association features for simulating and detecting web application attacks. IEEE Trans Sustain Comput 6:245–256. https://doi.org/10.1109/TSUSC.2018.2808430

    Article  Google Scholar 

  79. Ashraf J, Bakhshi AD, Moustafa N, Khurshid H, Javed A, Beheshti A (2021) Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems. IEEE Trans Intell Transp Syst 22:4507–4518. https://doi.org/10.1109/TITS.2020.3017882

    Article  Google Scholar 

  80. Koroniotis N, Moustafa N, Sitnikova E, Slay J (2018) Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques. In: Hu J, Khalil I (eds) Mobile networks and management. Springer International Publishing, Cham, pp 30–44

    Google Scholar 

  81. Moustafa N, Keshk M, Choo K-KR, Lynar T, Camtepe S, Whitty M (2021) DAD: a distributed anomaly detection system using ensemble one-class statistical learning in edge networks. Future Gener Comput Syst 118:240–251. https://doi.org/10.1016/j.future.2021.01.011

  82. García S, Grill M, Stiborek J, Zunino A (2014) An empirical comparison of botnet detection methods. Comput Secur 45:100–123. https://doi.org/10.1016/j.cose.2014.05.011

  83. Haider W, Moustafa N, Keshk M, Fernandez A, Choo K-KR, Wahab A (2020) FGMC-HADS: fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from Linux systems. Comput Secur 96:101906. https://doi.org/10.1016/j.cose.2020.101906

  84. Weinger B, Kim J, Sim A, Nakashima M, Moustafa N, Wu KJ (2020) Enhancing IoT anomaly detection performance for federated learning. In: 2020 16th international conference on mobility, sensing and networking (MSN), pp 206–213. https://doi.org/10.1109/MSN50589.2020.00045

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ishu Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kaushik, K., Khan, A., Kumari, A., Sharma, I., Dubey, R. (2024). Ethical Considerations in AI-Based Cybersecurity. In: Kaushik, K., Sharma, I. (eds) Next-Generation Cybersecurity. Blockchain Technologies. Springer, Singapore. https://doi.org/10.1007/978-981-97-1249-6_19

Download citation

Publish with us

Policies and ethics