Objective:Presenting a conceptual model in order to exploit artificial intelligence algorithms in cyber operations is based on the framework of miter attacks. Method:In order to achieve the mentioned goal, first and in the stage of data acquisition by initial search in Google, Google Scholar and reliable scientific databases (Science Direct, Springer, Emerald, Taylor and Francis) articles related to artificial intelligence and offensive cyber operations are explored and in general, 121 results were found.Then, using the text theme analysis approach, 39 codes were extracted in the form of basic themes. Findings:After combining and combining different codes, the network of research themes was extracted in the form of 18 basic themes and four organizing themes including (identification, implementation, anonymity, impact and action).Referring to the research expert community, in the form of a Delphi panel made up of 10 specialists, the quality test and validation of the categories was done.Finally, after applying the opinions of the research expert community, the conceptual model of the use of artificial intelligence technology algorithms in cyber operations was drawn. Conclusion:The explanation of the research results shows that artificial intelligence algorithms, while reducing the role of the human agent and automating the attack steps, significantly increase the accuracy, speed and effectiveness of the attacks
Alwasel, A. , Mishra, S. , & AlShehri, M. , (2023), Attacks on The Vehicle Ad-Hoc Network from Cyberspace. International Journal of Computing and Digital Systems.
Berzins, V. , (2022), Hybrid warfare: weaponized migration on the eastern border of the EU? The Interdisciplinary Journal of International Studies, 12(1), 19-19.
Guembe, B. , Azeta, A. , Misra, S. , Osamor, V. C. , Fernandez-Sanz, L. , & Pospelova, V. , (2022), The emerging threat of ai-driven cyber-attacks: A review. Applied Artificial Intelligence.
Huskaj, G. , (2019), The current state of research in offensive cyberspace operations. In 18th European Conference on Cyber Warfare and Security (ECCWS 2019), 4-5 July 2019, Coimbra, Portugal (pp. 660-667). Academic Conferences and Publishing International Limited.
Jp3-12, (2018), Cyberspace Operations, Joint Chiefs of Staff.
Kaur, D. , Uslu, S. , & Durresi, A. , (2021), Requirements for trustworthy artificial intelligence–a review, In Advances in Networked-Based Information Systems: The 23rd International Conference on Network-Based Information Systems, Springer International Publishing.
Laato, S. , Tiainen, M. , Najmul Islam, A. K. M. , & Mäntymäki, M. , (2022), How to explain AI systems to end users: a systematic literature review and research agenda. Internet Research.
LeCun, Y. , (2022), A path towards autonomous machine intelligence, Courant Institute of Mathematical Sciences, New York University.
Liu, C. , Singhal, A. , & Wijesekera, D. , (2020), Forensic analysis of advanced persistent threat attacks in cloud environments, In Advances in Digital Forensics XVI: 16th IFIP WG 11. 9 International Conference, New Delhi, India, January 6–8, 2020, Revised Selected Papers 16, SpringerInternational Publishing.
Maeda, R. , & Mimura, M. , (2021), Automating post-exploitation with deep reinforcement learning. Computers & Security.
Mirsky, Y. , Demontis, A. , Kotak, J. , Shankar, R. , Gelei, D. , Yang, L. ,... & Biggio, B. , (2023), The threat of offensive ai to organizations, Computers & Security.
Nguyen, H. V. , & Uehara, T. , (2023), Multilayer Action Representation based on MITRE ATT&CK for Automated Penetration Testing. Journal of Information Processing.
Nichols, N. , (2023), The Future of Cyber Systems: Human-AI Reinforcement Learning with Adversarial Robustness, In The Second Workshop on New Frontiers in Adversarial Machine Learning.
Pecoraro, , D’Amico, M. , & Romano, S. P. , (2021), RedHerd: Offensive Cyberspace Operations as a Service. Signals.
Quintero-Bonilla, S. , & Martín del Rey, A. , (2020), A new proposal on the advanced persistent threat: A survey. Applied Sciences.
Salik, H. , (2022), Offensive Cyber Operations: Failure to Dissuade Nation-State Adversaries in Cyberspace (Doctoral dissertation, University of the Cumberlands).
Sánchez del Monte, A. , & Hernández-Álvarez, L. , (2023), Analysis of Cyber-Intelligence Frameworks for AI Data Processing. Applied Sciences, 13(16), 9328.
Thanh, C. T. , & Zelinka, I. , (2019), A survey on artificial intelligence in malware as next-generation threats. In Mendel (Vol. 25, No. 2).
Thiebes, S. , Lins, S. , & Sunyaev, A. , (2021), Trustworthy artificial intelligence, Electronic Markets.
Walker-Munro, B. , Mount, D. , & Ioannou, R. , (2023), The Hacker Strikes Back: Examining the Lawfulness of “Offensive Cyber” Under the Laws of Australia.
Westbrook, T. , (2023), A Taxonomy of Radiofrequency Jamming and Spoofing Strategies and Criminal Motives. Journal of Strategic Security.
Yamin, M. M. , Ullah, M. , Ullah, H. , Katt, B. , Hijji, M. , & Muhammad, K. , (2022), Mapping Tools for Open-Source Intelligence with Cyber Kill Chain for Adversarial Aware Security. Mathematics.
Zacchia, N. , Dondo, M. , & Taylor, A. , (2022), Concepts for novel capabilities supporting cyber threat intelligence.
Zouave, E. , Bruce, M. , Colde, K. , Jaitner, M. , Rodhe, I. , & Gustafsson, T. , (2020), Artificially intelligent cyberattacks, Swedish Defence Research Agency, FOI.
Zurowski, S. , Lord, G. , & Baggili, I. , (2022), A quantitative analysis of offensive cyber operation (OCO) automation tools. In Proceedings of the 17th International Conference on Availability, Reliability and Security.
Mohammadi,H. and trasoli,A. (2025). Presenting the conceptual model of using artificial intelligence technology in Ofensive cyber operations. Military Science and Tactics, 20(70), 209-240. doi: 10.22034/qjmst.2025.2024258.2031
MLA
Mohammadi,H. , and trasoli,A. . "Presenting the conceptual model of using artificial intelligence technology in Ofensive cyber operations", Military Science and Tactics, 20, 70, 2025, 209-240. doi: 10.22034/qjmst.2025.2024258.2031
HARVARD
Mohammadi H., trasoli A. (2025). 'Presenting the conceptual model of using artificial intelligence technology in Ofensive cyber operations', Military Science and Tactics, 20(70), pp. 209-240. doi: 10.22034/qjmst.2025.2024258.2031
CHICAGO
H. Mohammadi and A. trasoli, "Presenting the conceptual model of using artificial intelligence technology in Ofensive cyber operations," Military Science and Tactics, 20 70 (2025): 209-240, doi: 10.22034/qjmst.2025.2024258.2031
VANCOUVER
Mohammadi H., trasoli A. Presenting the conceptual model of using artificial intelligence technology in Ofensive cyber operations. Military Science and Tactics, 2025; 20(70): 209-240. doi: 10.22034/qjmst.2025.2024258.2031