The Use of Artificial Intelligence in Cyber Operations
Copyright (c) 2025 Hankó Viktória

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abstract
The study examines the applications of artificial intelligence (AI) in cybersecurity, highlighting its role in modern cyber operations. AI technologies enable rapid threat identification, improve incident management efficiency and automate defence processes. Offensive applications include AI-based attack methods such as deepfake technology and adaptive phishing. The case study uses the example of a fictional country, Novaterra, to illustrate the integration of AI into the protection of critical infrastructure, including energy, water and financial systems. AI-based simulations have significant defence potential but also raise ethical issues. The research shows that the close link between AI and cybersecurity is essential for creating a sustainable digital society. The future of the technology lies in balancing innovation and ethical application.
Keywords:
How to Cite
References
BODA Mihály (2024): A kockázatkerülő háború és a bátorság a 20–21. század fordulóján. Honvédségi Szemle, 152(3), 113–125. Online: https://doi.org/10.35926/HSZ.2024.3.9
COPELAND, B. J. [é. n.]: Artificial Intelligence. Britannica. Online: https://www.britannica.com/technology/artificial-intelligence
GUEMBE, Blessing et al. (2022): The Emerging Threat of Ai-Driven Cyber Attacks: A Review. Applied Artificial Intelligence, 36(1). Online: https://doi.org/10.1080/08839514.2022.2037254
HAIG Zsolt (2019): Információs műveletek a kibertérben. Budapest: Dialóg Campus Kiadó.
KASSAI Károly (2022): A kibertér műveleti képesség szerepének, jelentőségének és fókuszának evolúciója a NATO stratégiai dokumentumai alapján. Military and Intelligence CyberSecurity Research Paper, (9), 1–38. Online: http://hdl.handle.net/20.500.12944/100742
KAUSHIK, Keshav et al. (2024): Ethical Considerations in AI-Based Cybersecurity. In KAUSHIK, Keshav – SHARMA, Ishu (szerk.): Next-Generation Cybersecurity. AI, ML, Blockchain. Singapore: Springer, 437–470. Online: https://doi.org/10.1007/978-981-97-1249-6_19
KOVÁCS László (2023): Hadviselés a 21. században: kiberműveletek. Budapest: Ludovika Egyetemi Kiadó.
MAIMÓ, Lorenzo Fernández et al. (2018): A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks. EEE Access, 6, 7700–7712. Online: https://doi.org/10.1109/ACCESS.2018.2803446
MOHAMMED, Ishaq Azhar (2020): Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature. International Journal of Innovations in Engineering Research and Technology, 7(9), 172–176. Online: https://repo.ijiert.org/index.php/ijiert/article/view/2797
NOBLES, Calvin (2024): The Weaponization of Artificial Intelligence in Cybersecurity: A Systematic Review. Procedia Computer Science, 239, 547–555. Online: https://doi.org/10.1016/j.procs.2024.06.206
RUSSELL, Stuart – NORVIG, Peter (2020): Artificial Intelligence. A Modern Approach. 4th Edition. London: Pearson.
SCHULZE, Matthias (2020): Cyber in War: Assessing the Strategic, Tactical, and Operational Utility of Military Cyber Operations. 12th International Conference on Cyber Conflict (CyCon). 183–197. Online: https://doi.org/10.23919/CyCon49761.2020.9131733
SHUKLA, Shubhendu S. – JAISWAL, Vijay (2013): Applicability of Artificial Intelligence in Different Fields of Life. International Journal of Scientific Engineering and Research, 1(1), 28–35. Online: https://www.doi.org/10.70729/1130915
TADDY, Matthew Alan (2018): The Technological Elements of Artificial Intelligence. NBER Working Paper, w24301. Online: https://www.nber.org/system/files/working_papers/w24301/w24301.pdf
ZHANG, Caiming – LU, Yang (2021): Study on Artificial Intelligence: The State of the Art and Future Prospects. Journal of Industrial Information Integration, 23, 100224. Online: https://doi.org/10.1016/j.jii.2021.100224
ZHANG, Zhimin et al. (2022): Artificial Intelligence in Cyber Security: Research Advances, Challenges, and Opportunities. Artificial Intelligence Review, 55, 1029–1053. Online: https://doi.org/10.1007/s10462-021-09976-0