Cyber Espionage in the Age of Artificial Intelligence: A Comparative Study of State-Sponsored Campaign

Obioha-Val, Onyinye Agatha and Olaniyi, Oluwaseun Oladeji and Gbadebo, Michael Olayinka and Balogun, Adebayo Yusuf and Olisa, Anthony Obulor (2025) Cyber Espionage in the Age of Artificial Intelligence: A Comparative Study of State-Sponsored Campaign. Asian Journal of Research in Computer Science, 18 (1). pp. 184-204. ISSN 2581-8260

[thumbnail of Val1812025AJRCOS130096.pdf] Text
Val1812025AJRCOS130096.pdf - Published Version

Download (907kB)

Abstract

This study investigates the transformative role of artificial intelligence (AI) in state-sponsored cyber espionage, focusing on its dual use in offensive and defensive operations. Using data from the MITRE ATT&CK Framework, FireEye APT Groups Database, UNSW-NB15 Intrusion Detection Dataset, and the Cyber Conflict Tracker by CFR, this research applied network graph analysis, multi-criteria decision analysis (MCDA), ensemble classification models, and Difference-in-Differences (DiD) analysis. Results revealed that AI-driven offensive techniques, phishing (degree centrality 0.85), and adaptive malware (betweenness centrality 0.81) significantly enhance operational precision and scalability. Defensively, ensemble classification models achieved up to 95.8% accuracy, highlighting AI's efficacy in intrusion detection. AI regulatory frameworks reduced misattribution rates by 20% and escalation incidents by 10%, demonstrating their critical role in mitigating geopolitical risks. The findings impress AI's transformative potential in advancing cyber operations and shaping international policy and governance. By addressing challenges such as attribution, escalation risks, and ethical dilemmas, this study highlights the necessity for stronger global cooperation and regulatory frameworks to navigate the dual-use nature of AI, providing actionable insights for policymakers, cybersecurity professionals, and researchers, emphasizing the urgency of aligning technological advancements with strategies for enhancing global cybersecurity resilience.

Item Type: Article
Subjects: East Asian Archive > Computer Science
Depositing User: Unnamed user with email support@eastasianarchive.com
Date Deposited: 31 Jan 2025 06:17
Last Modified: 11 Apr 2025 11:12
URI: http://authors.go2articles.com/id/eprint/1664

Actions (login required)

View Item
View Item