Please use this identifier to cite or link to this item: http://ir.lib.seu.ac.lk/handle/123456789/7700
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAnoshan, Yoganathan-
dc.contributor.authorAhamed Sabani, M. J.-
dc.contributor.authorHanan, M. R. M.-
dc.date.accessioned2026-02-18T11:26:30Z-
dc.date.available2026-02-18T11:26:30Z-
dc.date.issued2025-10-16-
dc.identifier.citation5th International Conference on Science and Technology 2025 (ICST-2025) Proceedings of Papers “INNOVATIVE APPROACHES FOR A SUSTAINABLE FUTURE: CONNECTING SCIENCE AND TECHNOLOGY FOR GLOBAL CHALLENGES” 16th October 2025. Faculty of Technology, South Eastern University of Sri Lanka, Sri Lanka. pp. 128-133.en_US
dc.identifier.isbn978-955-627-161-4 (e-ISBN)-
dc.identifier.urihttp://ir.lib.seu.ac.lk/handle/123456789/7700-
dc.description.abstractCyber threats are now more complicated and harder than ever with the swift development of artificial intelligence (AI). This study focuses on three key aspects of AI-driven cyber threats: social engineering with fake personal media, self modifying malware that attacks automatically and the tough challenges in defending systems against AI-backed cyberweapons. Because deepfake technology uses generative AI, it can make it simple and very convincing for criminals to carry out phishing and deceitful impersonation attacks on humans. Because it is driven by AI, autonomous malware can quickly transform to bypass usual anti-malware systems. Cyberweapons that incorporate AI such as automated creation of vulnerabilities, are a huge threat to computer networks. A comprehensive review of literature, as well as proposing a mixed methodology, this study studies how these threats work, their effects and the ways to control them. The results suggest that AI-based attacks are becoming more hidden and can be used on a large scale, so new defense methods are required. Participants cover the effectiveness of AI in detecting hackers, certain problems with today’s cybersecurity methods and what is and is not ethical when using AI in cybersecurity. To address these developing hazards, this paper proposes a multi-layered defense system that uses machine learning, deep learning and metaheuristic algorithms. The study urges the use of quick, flexible and ethical cybersecurity methods to defend vital systems in a world dominated by AI. This study supports current ongoing conversations by providing new findings for researchers, policymakers cybersecurity.en_US
dc.language.isoen_USen_US
dc.publisherFaculty of Technology, South Eastern University of Sri Lanka, Sri Lankaen_US
dc.subjectAI-Driven Cyber Threatsen_US
dc.subjectGenerative AIen_US
dc.subjectCyberweaponsen_US
dc.subjectHackersen_US
dc.subjectCybersecurityen_US
dc.titleAI-Driven cyber threats: unraveling deepfakes, autonomous malware, and defensive strategiesen_US
dc.typeArticleen_US
Appears in Collections:5th International Conference on Science and Technology

Files in This Item:
File Description SizeFormat 
ICST_2025_Proceedings_-19-164-128-133.pdf687.87 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.