Eighth International Scientific Conference Contemporary Issues in Economics, Business and Management [EBM 2024], [pp. 425-433]
AUTHOR(S) / AUTOR(I): Ana Kovačević
, Sonja D. Radenković
, Dragana Nikolić 
Download Full Pdf
DOI: 10.46793/EBM24.425K
ABSTRACT / SAŽETAK:
The rapid advancements in artificial intelligence (AI) have presented new opportunities for enhancing efficiency and economic competitiveness across various industries, espcially in banking. Machine learning (ML), as a subset of artificial intelligence, enables systems to adapt and learn from vast datasets, revolutionizing decision-making processes, fraud detection, and customer service automation. However, these innovations also introduce new challenges, particularly in the realm of cybersecurity. Adversarial attacks, such as data poisoning and evasion attacks, represent critical threats to machine learning models, exploiting vulnerabilities to manipulate outcomes or compromise sensitive information. Furthermore, this study highlights the dual-use nature of AI tools, which can be used by malicious user. To address these challenges, the paper emphasizes the importance of developing machine learning models with key characteristics such as security, trust, resilience and robustness. These features are essential to mitigating risks and ensuring secure deployment of AI technologies in banking sectors, where the protection of financial data is paramount. The findings underscore the urgent need for enhanced cybersecurity frameworks and continuous improvements in defensive mechanisms. By exploring both opportunities and risks, this paper aims to guide the responsible integration of AI in the banking sector, paving the way for innovation while safeguarding against emerging threats.
KEYWORDS / KLJUČNE REČI:
Artificial Intelligence, Machine Learning, Cyber Security, Adversarial Attacks, Banking
ACKNOWLEDGEMENT / PROJEKAT:
This work was supported by the Science Fund of the Republic of Serbia under Grant 7749151 within the Framework of the IDEAS Program—Management of New Security Risks Research and Simulation Development, NEWSiMR&D.
REFERENCES / LITERATURA:
- Aithal, P. S. (2023). An Analytical Study of Applications of Artificial Intelligence on Banking Practices. International Journal of Management, Technology and Social Sciences (IJMTS), 8(2), 133-144.
- Alcorn, M. A., Li, Q., Gong, Z., Wang, C., Mai, L., Ku, W.-S., & Nguyen, A. (2019). Strike (With) a Pose: Neural Networks Are Easily Fooled by Strange Poses of Familiar Objects. 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 4840–4849. https://doi.org/10.1109/CVPR.2019.00498
- Almalawi, A., Fahad, A., Tari, Z., Khan, A. I., Alzahrani, N., Bakhsh, S. T., Alassafi, M. O., Alshdadi, A., & Qaiyum, S. (2020). Add-On Anomaly Threshold Technique for Improving Unsupervised Intrusion Detection on SCADA Data. Electronics, 9(6), Article 6. https://doi.org/10.3390/electronics9061017
- Buchanan, A. B. (n.d.). A National Security Research Agenda for Cybersecurity and Artificial Intelligence CSET Issue Brief.
- Chin, K. (2024). ―Why is the Finance Sector a Target for Cyber Attacks?‖, UpGuard. Online: https://www.upguard.com/blog/finance-sector-cyber-attacks
- Gartner. (2024a, a). 2024 Board of Directors Survey: Elevate Sustainability Value. Gartner. https://www.gartner.com/en/documents/5533395
- Gartner, b. (2024b). 2025 Gartner CIO and Technology Executive survey. Gartner, Inc.
- Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv Preprint arXiv:1412.6572.
- Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., & Bengio, Y. (2014). Generative Adversarial Nets. Advances in Neural Information Processing Systems, 27. https://proceedings.neurips.cc/paper_files/paper/2014/hash/ 5ca3e9b122f61f8f06494c97b1afccf3-Abstract.html
- Hazell, J. (2023). Spear Phishing With Large Language Models (arXiv:2305.06972). arXiv. https://doi.org/10.48550/arXiv.2305.06972
- Joint Task Force on Cybersecurity. (2018). Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. ACM. https://doi.org/10.1145/3422808
- Kasperski (2024). Kaspersky predicts quantum-proof ransomware and advancements in mobile financial cyberthreats in 2025. (2024, November 14). /. https://www.kaspersky.com/about/press-releases/kaspersky-predicts-quantum-proof- ransomware-and-advancements-in-mobile-financial-cyberthreats-in-2025
- Khadka, A., Sthapit, S., Epiphaniou, G., & Maple, C. (2024). Resilient Machine Learning: Advancement, Barriers, and Opportunities in the Nuclear Industry. ACM Computing Surveys, 56(9), 1–29. https://doi.org/10.1145/3648608
- Koball, C., Wang, Y., Rimal, B. P., & Vaidyan, V. (2024). Machine Learning Security: Threat Model, Attacks, and Challenges. Computer, 57(10), 26–35. Computer. https://doi.org/10.1109/MC.2024.3396357
- Kocher, G., & Kumar, G. (2021). Machine learning and deep learning methods for intrusion detection systems: Recent developments and challenges. Soft Computing, 25(15), 9731–9763. https://doi.org/10.1007/s00500-021-05893-0
- Kovačević, A. (2023). Mašinsko Učenje i Sajber Bezbednost. Zbornik Radova Sa Konferencije Strateški i Normativni Okvir Republike Srbije Za Reagovanje Na Savremene Bezbednosne Rizike. https://scholar.google.com/scholar?cluster=5529511828921685811&hl=en&inst=10 367705725260204636&oi=scholarr
- Li, Y., Yang, X., Wu, B., & Lyu, S. (2019). Hiding faces in plain sight: Disrupting ai face synthesis with adversarial perturbations. arXiv Preprint arXiv:1906.09288.
- Nguyen, T. T., & Reddi, V. J. (2023). Deep Reinforcement Learning for Cyber Security. IEEE Transactions on Neural Networks and Learning Systems, 34(8), 3779–3795. IEEE Transactions on Neural Networks and Learning Systems. https://doi.org/10.1109/TNNLS.2021.3121870
- Oracle & KPMG. (2019). Defining Edge Intelligence: Closing Visibility Gaps with a Layered Defense Strategy ORACLE AND KPMG CLOUD THREAT REPORT 2019 Oracle and KPMG Cloud Threat Report 2019 2.
- Pinto, A., Herrera, L.-C., Donoso, Y., & Gutierrez, J. A. (2023). Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure. Sensors, 23(5), Article 5. https://doi.org/10.3390/s23052415
- Radenković, S. D., Hanić, H., & Bugarčić, M. (2023). Applying Artificial Intelligence in the Digital Transformation of Banking Sector. Proceedings, 85(1), Article 1. https://doi.org/10.3390/proceedings2023085019
- Saavedra, G. J., Rodhouse, K. N., Dunlavy, D. M., & Kegelmeyer, P. W. (2019). A Review of Machine Learning Applications in Fuzzing. http://arxiv.org/abs/1906.11133
- Sau, M., Cribbs, J., & Hoeppe, A. (2024, November 8). How industries are implementing AI use cases. https://webinar.gartner.com/652327/home
- Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., & Xu, M. (2020). A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access, 8, 222310–222354. IEEE Access. https://doi.org/10.1109/ACCESS.2020.3041951
- Sobers, R. (2022). Data Breach Response Times: Trends and Tips. https://www.varonis.com/blog/data-breach-response-times