Analysis and classification of web threats in systems with intelligent assistants
DOI:
https://doi.org/10.18372/2225-5036.31.21167Keywords:
web security, threat modeling, intelligent assistants, artificial intelligence, AI-based threat modeling, web system cybersecurity, web application architectureAbstract
This article investigates the transformation of web threat models driven by the integration of intelligent assistants into modern distributed web systems. Unlike existing approaches that focus primarily on technical vulnerabilities, the study argues that an intelligent assistant constitutes a qualitatively new architectural attack surface for which classical threat modeling frameworks - including STRIDE and OWASP methodologies - are structurally inadequate. The core finding is that the principal risk shifts from the syntactic validation layer to the semantic interpretation layer: an intelligent assistant acts as a probabilistic intermediary between user intent and system operations, making its behavior context-dependent and non-deterministic in ways that evade automated scanners and standard penetration testing. Based on comparative analysis of traditional and AI-oriented architectures, five categories of novel threats are identified: intent manipulation (prompt injection), information leakage through data aggregation, model hallucination risks, agent over-permission, and context boundary violations. For each category, the article demonstrates why it remains invisible to DAST tools and conventional security controls. A four-layer threat modeling framework is proposed, explicitly incorporating the intent interpretation layer as a distinct attack surface without a counterpart in classical web systems. The proposed framework extends STRIDE by treating the intelligent assistant as an independent actor with its own decision logic. The study acknowledges its primary limitation: the classification and model are conceptually grounded and scenario-validated rather than empirically verified on production systems. Directions for future work include empirical red-teaming validation, development of AI-specific security testing methodologies, and analysis of threat topology across different agent architectures (RAG, multi-agent, tool-use).
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.




