Cybersecurity Strategies for Protecting Against AI-Generated Disinformation Campaigns

Authors

  • Saswata Dey Independent Researcher USA. Author
  • Sundar Tiwari Independent Researcher USA. Author
  • Writuraj Sarma Independent Researcher, USA. Author

DOI:

https://doi.org/10.63282/3050-9246.IJETCSIT-V5I1P105

Keywords:

Cybersecurity, Disinformation Campaigns, Deepfakes, Adversarial Machine Learning, Blockchain, GANs

Abstract

AI-assisted disinformation has become a new variant of cyber threats that impacts people’s campaigns and mentalities, political processes, and economic growth. New problems, namely deep learning techniques, GANs, language models, and synthetic media, cannot be solved by simple cybersecurity approaches. The paper aspires to develop a detailed cybersecurity model that discusses the measures for countering disinformation created by AI by implementing multiple layers of protection, such as an automated detection system, real-time content check mechanism, human involvement, and intersectoral cooperation. Firstly, machine learning is used in attacking/defending mode for identifying fake or doctored media; secondly, use of blockchain for documenting media origins; thirdly, psychological profiling for counter-narrative strategies. This study provides a qualitative and quantitative assessment of the proposed framework with synthetic news articles, deepfake videos, and text generated from deep learning models. It also concerns the socio-technical aspects of disinformation, which is why the study incorporates ethical analysis, policies, and users’ awareness as its parts. The conclusion drawn concerns the effectiveness of the threat and puts into perspective that the best way to control it is by implementing technological, regulatory and behavioral approaches

Downloads

Download data is not yet available.

References

[1] Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A. N., ... & Polosukhin, I. (2017). Attention is all you need. Advances in neural information processing systems, 30.

[2] Brown, T., Mann, B., Ryder, N., Subbiah, M., Kaplan, J. D., Dhariwal, P., ... & Amodei, D. (2020). Language models are few-shot learners. Advances in neural information processing systems, 33, 1877-1901.

[3] Karras, T., Aila, T., Laine, S., & Lehtinen, J. (2017). Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196.

[4] Zhu, J. Y., Park, T., Isola, P., & Efros, A. A. (2017). Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proceedings of the IEEE International Conference on Computer Vision (pp. 2223-2232).

[5] Goodfellow, I. J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., ... & Bengio, Y. (2014). Generative adversarial nets. Advances in neural information processing systems, 27.

[6] He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 770-778).

[7] Maras, M. H., & Alexandrou, A. (2019). Determining the authenticity of video evidence in the age of artificial intelligence and the wake of Deepfake videos. The international journal of evidence & proof, 23(3), 255-262.

[8] Chesney, B., & Citron, D. (2019). Deepfakes: A looming challenge for privacy, democracy, and national security. Calif. L. Rev., 107, 1753.

[9] Shu, K., Sliva, A., Wang, S., Tang, J., & Liu, H. (2017). Fake news detection on social media: A data mining perspective. ACM SIGKDD explorations newsletter, 19(1), 22-36.

[10] AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security, 119, 102754.

[11] Zhang, J., & Li, C. (2019). Adversarial examples: Opportunities and challenges. IEEE transactions on neural networks and learning systems, 31(7), 2578-2593.

[12] Rawal, A., Rawat, D., & Sadler, B. M. (2021). Recent advances in adversarial machine learning: status, challenges and perspectives. Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications III, 11746, 701-712.

[13] Wilchek, M., Hanley, W., Lim, J., Luther, K., & Batarseh, F. A. (2023). Human-in-the-loop for computer vision assurance: A survey. Engineering Applications of Artificial Intelligence, 123, 106376.

[14] Kuznetcova, E. A., & A Kuznetcova, E. (2018). The Phenomenon of Anticipation in Psychology: Theoretical Analysis. European Proceedings of Social and Behavioural Sciences, 45.

[15] Veiga, J., Expósito, R. R., Pardo, X. C., Taboada, G. L., & Tourifio, J. (2016, December). Performance evaluation of big data frameworks for large-scale data analytics. In 2016 IEEE International Conference on Big Data (Big Data) (pp. 424-431). IEEE.

[16] Kasturi, R., Goldgof, D., Soundararajan, P., Manohar, V., Garofolo, J., Bowers, R., ... & Zhang, J. (2008). Framework for performance evaluation of face, text, and vehicle detection and tracking in video: Data, metrics, and protocol. IEEE transactions on pattern analysis and machine intelligence, 31(2), 319-336.

[17] Ramachandran, A., & Kantarcioglu, M. (2018, March). Smartprovenance: a distributed, blockchain-based data provenance system. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (pp. 35-42).

[18] Anand, V., Sheley, M. E., Xu, S., & Downs, S. M. (2012). Real-time alert system: a disease management system leveraging health information exchange. Online Journal of Public Health Informatics, 4(3).

[19] Bouzidi, Z., Amad, M., & Boudries, A. (2019). Intelligent and real-time alert model for disaster management based on information retrieval from multiple sources. International Journal of Advanced Media and Communication, 7(4), 309-330.

[20] Wani, M. A. (2023). AI and NLP-Empowered Framework for Strengthening Social Cyber Security. In Recent Advancements in Multimedia Data Processing and Security: Issues, Challenges, and Techniques (pp. 32-45). IGI Global.

Published

2024-03-30

Issue

Section

Articles

How to Cite

1.
Dey S, Tiwari S, Sarma W. Cybersecurity Strategies for Protecting Against AI-Generated Disinformation Campaigns. IJETCSIT [Internet]. 2024 Mar. 30 [cited 2025 Sep. 13];5(1):41-5. Available from: https://www.ijetcsit.org/index.php/ijetcsit/article/view/168

Similar Articles

61-70 of 156

You may also start an advanced similarity search for this article.