Journal is indexed in following databases:



2024 Journal Impact Factor - 0.6
2024 CiteScore - 1.9



HomePage
 




 


 

ISSN 2083-6473
ISSN 2083-6481 (electronic version)
 

 

 

Editor-in-Chief

Associate Editor
Prof. Tomasz Neumann
 

Published by
TransNav, Faculty of Navigation
Gdynia Maritime University
3, John Paul II Avenue
81-345 Gdynia, POLAND
www http://www.transnav.eu
e-mail transnav@umg.edu.pl
Artificial Intelligence in Maritime Cybersecurity: Dual-Use Applications for Defense and Offense in the Age of Digital Seas
1 Gdynia Maritime University, Gdynia, Poland
ABSTRACT: The maritime sector’s rapid digital transformation – including the integration of IT and operational technology (OT) systems and the rise of autonomous vessels – has significantly expanded the cyberattack surface[1] . Artificial Intelligence (AI) now plays a dual role in this landscape, acting as both a powerful enabler of cyberattacks and a critical tool for cybersecurity defense [2] . This paper explores current and emerging uses of AI in offensive and defensive cyber operations targeting maritime systems and infrastructure. On the offensive side, threat actors are leveraging AI for sophisticated attacks such as AI-generated spear phishing, polymorphic malware generation, GPS spoofing, and manipulation of industrial control systems (ICS)[3], [4]. On the defensive side, AI is employed in anomaly detection, predictive analytics, autonomous vessel and port monitoring, and other security applications[5]. The paper also examines vulnerabilities of AI itself – including adversarial attacks, data poisoning, and model manipulation – and discusses strategies to enhance maritime cyber resilience. Key strategies include the use of digital twin simulations, AI-driven deception (honeypots), adversarial training, explainable AI, and international cooperation for information sharing. By analyzing both offensive and defensive developments, this study provides a comprehensive perspective on the dual-use nature of AI in shaping the future of maritime cybersecurity.
REFERENCES
R. Fang, R. Bindu, A. Gupta, and D. Kang, “LLM Agents can Autonomously Exploit One-day Vulnerabilities,” Apr. 17, 2024, arXiv: arXiv:2404.08144. doi: 10.48550/arXiv.2404.08144.
L. Wu, X. Zhong, J. Liu, and X. Wang, “PTGroup: An Automated Penetration Testing Framework Using LLMs and Multiple Prompt Chains,” in Advanced Intelligent Computing Technology and Applications - 20th International Conference, ICIC 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part IX, D.-S. Huang, W. Chen, and J. Guo, Eds., in Lecture Notes in Computer Science, vol. 14870. Springer, 2024, pp. 220–232. doi: 10.1007/978-981-97-5606-3_19. - doi:10.1007/978-981-97-5606-3_19
I. Durlik, T. Miller, E. Kostecka, and T. Tuński, “Artificial Intelligence in Maritime Transportation: A Comprehensive Review of Safety and Risk Management Applications,” Appl. Sci., vol. 14, no. 18, Art. no. 18, Jan. 2024, doi: 10.3390/app14188420. - doi:10.3390/app14188420
A. Ergasheva, F. Akhmedov, A. Abdusalomov, and W. Kim, “Advancing Maritime Safety: Early Detection of Ship Fires through Computer Vision, Deep Learning Approaches, and Histogram Equalization Techniques,” Fire, vol. 7, p. 84, Mar. 2024, doi: 10.3390/fire7030084. - doi:10.3390/fire7030084
E. Kovacs, “OpenAI Says Iranian Hackers Used ChatGPT to Plan ICS Attacks,” SecurityWeek. Accessed: Jun. 10, 2025. [Online]. Available: https://www.securityweek.com/openai-says-iranian-hackers-used-chatgpt-to-plan-ics-attacks/
“OpenAI details how threat actors are abusing ChatGPT | TechTarget,” Search Security. Accessed: Jun. 10, 2025. [Online]. Available: https://www.techtarget.com/searchsecurity/news/366613512/OpenAI-details-how-threat-actors-are-abusing-ChatGPT
J. Hazell, “Spear Phishing With Large Language Models,” arXiv.org. Accessed: Jun. 10, 2025. [Online]. Available: https://arxiv.org/abs/2305.06972v3
F. Heiding, B. Schneier, A. Vishwanath, and J. Bernstein, “Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models”.
“AI-Powered Phishing Outperforms Elite Cybercriminals in 2025 - Hoxhunt.” Accessed: Jun. 10, 2025. [Online]. Available: https://hoxhunt.com/blog/ai-powered-phishing-vs-humans
“Maritime needs to prepare for AI-assisted cyberattacks.” Accessed: Jun. 29, 2025. [Online]. Available: https://mykn.kuehne-nagel.com/news/article/maritime-needs-to-prepare-for-aiassisted-cybe-02-Jun-2025
J. Sims, “BlackMamba: Using AI to Generate Polymorphic Malware.” Accessed: Jun. 10, 2025. [Online]. Available: https://www.hyas.com/blog/blackmamba-using-ai-to-generate-polymorphic-malware
M. Burgess, “Criminals Have Created Their Own ChatGPT Clones,” Wired. Accessed: Jun. 10, 2025. [Online]. Available: https://www.wired.com/story/chatgpt-scams-fraudgpt-wormgpt-crime/
“2023 Cyber Trends and Insights in the Marine Environment Report,” United States Coast Guard News. Accessed: Jun. 29, 2025. [Online]. Available: https://www.news.uscg.mil/maritime-commons/Article/3750095/2023-cyber-trends-and-insights-in-the-marine-environment-report/https%3A%2F%2Fwww.news.uscg.mil%2Fmaritime-commons%2FArticle%2F3750095%2F2023-cyber-trends-and-insights-in-the-marine-environment-report%2F
“Coast Guard Cyber Command releases 2024 CTIME report,” United States Coast Guard News. Accessed: Jul. 05, 2025. [Online]. Available: https://www.news.uscg.mil/maritime-commons/Article/4189739/coast-guard-cyber-command-releases-2024-ctime-report/https%3A%2F%2Fwww.news.uscg.mil%2Fmaritime-commons%2FArticle%2F4189739%2Fcoast-guard-cyber-command-releases-2024-ctime-report%2F
“AI-Powered ‘BlackMamba’ Keylogging Attack Evades Modern EDR Security.” Accessed: Jun. 10, 2025. [Online]. Available: https://www.darkreading.com/endpoint-security/ai-blackmamba-keylogging-edr-security
Z. Labs, “Links and materials for Living off Microsoft Copilot,” Zenity Labs. Accessed: Jun. 29, 2025. [Online]. Available: https://labs.zenity.io/p/links-materials-living-off-microsoft-copilot
“How to Weaponize Microsoft Copilot for Cyberattackers.” Accessed: Jun. 29, 2025. [Online]. Available: https://www.darkreading.com/application-security/how-to-weaponize-microsoft-copilot-for-cyberattackers
“Iran-Linked CyberAv3ngers Group Uses ChatGPT To Plan Industrial Attacks.” Accessed: Jun. 10, 2025. [Online]. Available: https://thecyberexpress.com/cyberav3ngers-use-chatgpt-to-plan-ics-attacks/
T. Miller, I. Durlik, E. Kostecka, S. Sokołowska, P. Kozlovska, and R. Zwolak, “Artificial Intelligence in Maritime Cybersecurity: A Systematic Review of AI-Driven Threat Detection and Risk Mitigation Strategies,” Electronics, vol. 14, no. 9, Art. no. 9, Jan. 2025, doi: 10.3390/electronics14091844. - doi:10.3390/electronics14091844
R. Dharma, “Cydome launches maritime cybersecurity platform,” Ship Technology. Accessed: Jun. 30, 2025. [Online]. Available: https://www.ship-technology.com/news/cydome-maritime-cybersecurity-platform/
“Complete cybersecurity protection solution, built for maritime,” CYDOME. Accessed: Jun. 30, 2025. [Online]. Available: https://cydome.io/cydome-protect/
“AI in the Maritime Industry: Revolutionizing Port Traffic Management | LinkedIn.” Accessed: Jun. 10, 2025. [Online]. Available: https://www.linkedin.com/pulse/ai-maritime-industry-revolutionizing-port-traffic-marc-asselin-ajsoe/
Citation note:
Cichocki R.: Artificial Intelligence in Maritime Cybersecurity: Dual-Use Applications for Defense and Offense in the Age of Digital Seas. TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation, Vol. 19, No. 2, doi:10.12716/1001.19.02.34, pp. 617-623, 2025
Authors in other databases:

Other publications of authors:


File downloaded 3 times








Important: TransNav.eu cookie usage
The TransNav.eu website uses certain cookies. A cookie is a text-only string of information that the TransNav.EU website transfers to the cookie file of the browser on your computer. Cookies allow the TransNav.eu website to perform properly and remember your browsing history. Cookies also help a website to arrange content to match your preferred interests more quickly. Cookies alone cannot be used to identify you.
Akceptuję pliki cookies z tej strony