Papers
Topics
Authors
Recent
2000 character limit reached

Research on Virus Cyberattack-Defense Based on Electromagnetic Radiation (2306.17508v1)

Published 30 Jun 2023 in cs.CR and eess.SP

Abstract: Information technology and telecommunications have rapidly permeated various domains, resulting in a significant influx of data traversing the networks between computers. Consequently, research of cyberattacks in computer systems has become crucial for many organizations. Accordingly, recent cybersecurity incidents have underscored the rapidly evolving nature of future threats and attack methods, particularly those involving computer viruses wireless injection. This paper aims to study and demonstrate the feasibility of remote computer virus radiation injection. To achieve this objective, digital signal processing (DSP) plays a vital role. By studying the principles and models of radiation attacks and computer virus propagation, the modulation of the binary data stream of the simulated virus into a terahertz radar carrier signal by Phase-Shift Keying (PSK) is simulated, enabling the implementation of an attack through the "field to line" coupling of electromagnetic signals. Finally, the defense and countermeasures based on signal recognition are discussed for such attacks. Additionally, an idea of establishing a virus library for cyberattack signals and employing AI algorithms for automated intrusion detection is proposed as a means to achieve cybersecurity situation awareness.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (17)
  1. Fred Cohen. Computer viruses: theory and experiments. Computers & security, 6(1):22–35, 1987.
  2. Research on the network security based on radiated virus. In 2010 International Conference on Information, Networking and Automation (ICINA), volume 2, pages V2–502. IEEE, 2010.
  3. Invisible digital front: can cyber attacks shape battlefield events? Journal of Conflict Resolution, 63(2):317–347, 2019.
  4. Is your cat infected with a computer virus? In Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM’06), pages 10–pp. IEEE, 2006.
  5. Michael N Schmitt. Wired warfare: Computer network attack and jus in bello. International Review of the Red Cross, 84(846):365–399, 2002.
  6. Sailesh Kumar. Survey of current network intrusion detection techniques. Washington Univ. in St. Louis, pages 1–18, 2007.
  7. Email networks and the spread of computer viruses. Physical Review E, 66(3):035101, 2002.
  8. Modeling and control of computer virus attack on a targeted network. Physica A: Statistical Mechanics and its Applications, 538:122617, 2020.
  9. Zhang Kai. Introduction to Information Security. Tsinghua University Press, 2018.
  10. Li Xiongwei. Research on network countermeasure system and its key technology. Beijing University of Posts and Telecommunications, 2005.
  11. Two models of computer virus propagation. Journal of Beijing University of Posts and Telecommunications, 22(1):92, 1999.
  12. Jie Chen. A stady for the security of computer network based on attack and anti-attack of radiated virus. Master’s thesis, Xidian University, 2007.
  13. Jean-Luc Archimbaud. Ethernet-ieee802. 3. 1992.
  14. Cui Xuewen. Application analysis of virus protection technology in computer network protection. Network Security Technology & Application, 2021.
  15. YT Chan and LG Gadbois. Identification of the modulation type of a signal. Signal Processing, 16(2):149–154, 1989.
  16. Automatic modulation recognition of communication signals. 2013.
  17. Fuqin Xiong. Digital Modulation Techniques, (Artech House Telecommunications Library). Artech House, Inc., 2006.

Summary

We haven't generated a summary for this paper yet.

Slide Deck Streamline Icon: https://streamlinehq.com

Whiteboard

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (1)

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.