Research on Virus Cyberattack-Defense Based on Electromagnetic Radiation (2306.17508v1)
Abstract: Information technology and telecommunications have rapidly permeated various domains, resulting in a significant influx of data traversing the networks between computers. Consequently, research of cyberattacks in computer systems has become crucial for many organizations. Accordingly, recent cybersecurity incidents have underscored the rapidly evolving nature of future threats and attack methods, particularly those involving computer viruses wireless injection. This paper aims to study and demonstrate the feasibility of remote computer virus radiation injection. To achieve this objective, digital signal processing (DSP) plays a vital role. By studying the principles and models of radiation attacks and computer virus propagation, the modulation of the binary data stream of the simulated virus into a terahertz radar carrier signal by Phase-Shift Keying (PSK) is simulated, enabling the implementation of an attack through the "field to line" coupling of electromagnetic signals. Finally, the defense and countermeasures based on signal recognition are discussed for such attacks. Additionally, an idea of establishing a virus library for cyberattack signals and employing AI algorithms for automated intrusion detection is proposed as a means to achieve cybersecurity situation awareness.
- Fred Cohen. Computer viruses: theory and experiments. Computers & security, 6(1):22–35, 1987.
- Research on the network security based on radiated virus. In 2010 International Conference on Information, Networking and Automation (ICINA), volume 2, pages V2–502. IEEE, 2010.
- Invisible digital front: can cyber attacks shape battlefield events? Journal of Conflict Resolution, 63(2):317–347, 2019.
- Is your cat infected with a computer virus? In Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM’06), pages 10–pp. IEEE, 2006.
- Michael N Schmitt. Wired warfare: Computer network attack and jus in bello. International Review of the Red Cross, 84(846):365–399, 2002.
- Sailesh Kumar. Survey of current network intrusion detection techniques. Washington Univ. in St. Louis, pages 1–18, 2007.
- Email networks and the spread of computer viruses. Physical Review E, 66(3):035101, 2002.
- Modeling and control of computer virus attack on a targeted network. Physica A: Statistical Mechanics and its Applications, 538:122617, 2020.
- Zhang Kai. Introduction to Information Security. Tsinghua University Press, 2018.
- Li Xiongwei. Research on network countermeasure system and its key technology. Beijing University of Posts and Telecommunications, 2005.
- Two models of computer virus propagation. Journal of Beijing University of Posts and Telecommunications, 22(1):92, 1999.
- Jie Chen. A stady for the security of computer network based on attack and anti-attack of radiated virus. Master’s thesis, Xidian University, 2007.
- Jean-Luc Archimbaud. Ethernet-ieee802. 3. 1992.
- Cui Xuewen. Application analysis of virus protection technology in computer network protection. Network Security Technology & Application, 2021.
- YT Chan and LG Gadbois. Identification of the modulation type of a signal. Signal Processing, 16(2):149–154, 1989.
- Automatic modulation recognition of communication signals. 2013.
- Fuqin Xiong. Digital Modulation Techniques, (Artech House Telecommunications Library). Artech House, Inc., 2006.
Sponsor
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.