|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 187 - Issue 88 |
| Published: March 2026 |
| Authors: Shekar Munirathnam |
10.5120/ijca2026926540
|
Shekar Munirathnam . Evaluation of Generative AI-Enabled Cyber Attack Vectors. International Journal of Computer Applications. 187, 88 (March 2026), 44-50. DOI=10.5120/ijca2026926540
@article{ 10.5120/ijca2026926540,
author = { Shekar Munirathnam },
title = { Evaluation of Generative AI-Enabled Cyber Attack Vectors },
journal = { International Journal of Computer Applications },
year = { 2026 },
volume = { 187 },
number = { 88 },
pages = { 44-50 },
doi = { 10.5120/ijca2026926540 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2026
%A Shekar Munirathnam
%T Evaluation of Generative AI-Enabled Cyber Attack Vectors%T
%J International Journal of Computer Applications
%V 187
%N 88
%P 44-50
%R 10.5120/ijca2026926540
%I Foundation of Computer Science (FCS), NY, USA
Generative artificial intelligence represents a transformative shift in offensive cyber operations. This research examines AI weaponization, particularly Large Language Models (LLMs) and neural generation systems, within attack contexts. A classification framework spanning four operational domains is presented: engineered social manipulation, adaptive malware development, automated vulnerability discovery, and intelligent reconnaissance. Through empirical analysis of documented incidents, technical capability assessments, quantitative comparative evaluations, and workflow modeling, it is demonstrated how these technologies amplify adversarial effectiveness while compressing attack timelines by up to 87% and reducing prerequisite expertise. The findings reveal critical vulnerabilities in contemporary defense architectures, particularly regarding reliance on pattern-based detection and signature-dependent controls. Evidence of asymmetric advantages emerging from AI adoption is presented, wherein offensive applications outpace defensive countermeasures. The paper concludes with countermeasure frameworks incorporating AI-enhanced defensive technologies alongside regulatory approaches necessary for sustainable security [1], [14], [21].