Research on Virus Cyberattack-Defense Based on Electromagnetic Radiation

06/30/2023
by   Ruochen Wu, et al.
0

Information technology and telecommunications have rapidly permeated various domains, resulting in a significant influx of data traversing the networks between computers. Consequently, research of cyberattacks in computer systems has become crucial for many organizations. Accordingly, recent cybersecurity incidents have underscored the rapidly evolving nature of future threats and attack methods, particularly those involving computer viruses wireless injection. This paper aims to study and demonstrate the feasibility of remote computer virus radiation injection. To achieve this objective, digital signal processing (DSP) plays a vital role. By studying the principles and models of radiation attacks and computer virus propagation, the modulation of the binary data stream of the simulated virus into a terahertz radar carrier signal by Phase-Shift Keying (PSK) is simulated, enabling the implementation of an attack through the "field to line" coupling of electromagnetic signals. Finally, the defense and countermeasures based on signal recognition are discussed for such attacks. Additionally, an idea of establishing a virus library for cyberattack signals and employing artificial intelligence (AI) algorithms for automated intrusion detection is proposed as a means to achieve cybersecurity situation awareness.

READ FULL TEXT
research
05/17/2021

SoundFence: Securing Ultrasonic Sensors in Vehicles Using Physical-Layer Defense

Autonomous vehicles (AVs), equipped with numerous sensors such as camera...
research
05/03/2022

CANShield: Signal-based Intrusion Detection for Controller Area Networks

Modern vehicles rely on a fleet of electronic control units (ECUs) conne...
research
02/03/2010

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems

In recent years computer systems have become increasingly complex and co...
research
07/20/2022

Digital Twin-based Intrusion Detection for Industrial Control Systems

Digital twins have recently gained significant interest in simulation, o...
research
02/21/2022

A Tutorial on Adversarial Learning Attacks and Countermeasures

Machine learning algorithms are used to construct a mathematical model f...
research
10/27/2022

Trust-Awareness to Secure Swarm Intelligence from Data Injection Attack

Enabled by the emerging industrial agent (IA) technology, swarm intellig...
research
09/06/2023

Disarming Steganography Attacks Inside Neural Network Models

Similar to the revolution of open source code sharing, Artificial Intell...

Please sign up or login with your details

Forgot password? Click here to reset