Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning
The electromagnetic Trojan attack can break through the physical isolation to attack, and the leaked channel does not use the system network resources, which makes the traditional firewall and other intrusion detection devices unable to effectively prevent. Based on the existing research results, th...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2020/6641844 |
id |
doaj-722c3d4060e9472fbabaf81478b54633 |
---|---|
record_format |
Article |
spelling |
doaj-722c3d4060e9472fbabaf81478b546332020-12-07T09:08:22ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/66418446641844Research and Analysis of Electromagnetic Trojan Detection Based on Deep LearningJiazhong Lu0Xiaolei Liu1Shibin Zhang2Yan Chang3School of Cybersecurity, Chengdu University of Information Technology, Chengdu 610225, Sichuan, ChinaInstitute of Computer Application, China Academy of Engineering Physics, Mianyang, Sichuan 621900, ChinaSchool of Cybersecurity, Chengdu University of Information Technology, Chengdu 610225, Sichuan, ChinaSchool of Cybersecurity, Chengdu University of Information Technology, Chengdu 610225, Sichuan, ChinaThe electromagnetic Trojan attack can break through the physical isolation to attack, and the leaked channel does not use the system network resources, which makes the traditional firewall and other intrusion detection devices unable to effectively prevent. Based on the existing research results, this paper proposes an electromagnetic Trojan detection method based on deep learning, which makes the work of electromagnetic Trojan analysis more intelligent. First, the electromagnetic wave signal is captured using software-defined radio technology, and then the signal is initially filtered in combination with a white list, a demodulated signal, and a rate of change in intensity. Secondly, the signal in the frequency domain is divided into blocks in a time-window mode, and the electromagnetic signals are represented by features such as time, information amount, and energy. Finally, the serialized signal feature vector is further extracted using the LSTM algorithm to identify the electromagnetic Trojan. This experiment uses the electromagnetic Trojan data published by Gurion University to test. And it can effectively defend electromagnetic Trojans, improve the participation of computers in electromagnetic Trojan detection, and reduce the cost of manual testing.http://dx.doi.org/10.1155/2020/6641844 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jiazhong Lu Xiaolei Liu Shibin Zhang Yan Chang |
spellingShingle |
Jiazhong Lu Xiaolei Liu Shibin Zhang Yan Chang Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning Security and Communication Networks |
author_facet |
Jiazhong Lu Xiaolei Liu Shibin Zhang Yan Chang |
author_sort |
Jiazhong Lu |
title |
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning |
title_short |
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning |
title_full |
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning |
title_fullStr |
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning |
title_full_unstemmed |
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning |
title_sort |
research and analysis of electromagnetic trojan detection based on deep learning |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2020-01-01 |
description |
The electromagnetic Trojan attack can break through the physical isolation to attack, and the leaked channel does not use the system network resources, which makes the traditional firewall and other intrusion detection devices unable to effectively prevent. Based on the existing research results, this paper proposes an electromagnetic Trojan detection method based on deep learning, which makes the work of electromagnetic Trojan analysis more intelligent. First, the electromagnetic wave signal is captured using software-defined radio technology, and then the signal is initially filtered in combination with a white list, a demodulated signal, and a rate of change in intensity. Secondly, the signal in the frequency domain is divided into blocks in a time-window mode, and the electromagnetic signals are represented by features such as time, information amount, and energy. Finally, the serialized signal feature vector is further extracted using the LSTM algorithm to identify the electromagnetic Trojan. This experiment uses the electromagnetic Trojan data published by Gurion University to test. And it can effectively defend electromagnetic Trojans, improve the participation of computers in electromagnetic Trojan detection, and reduce the cost of manual testing. |
url |
http://dx.doi.org/10.1155/2020/6641844 |
work_keys_str_mv |
AT jiazhonglu researchandanalysisofelectromagnetictrojandetectionbasedondeeplearning AT xiaoleiliu researchandanalysisofelectromagnetictrojandetectionbasedondeeplearning AT shibinzhang researchandanalysisofelectromagnetictrojandetectionbasedondeeplearning AT yanchang researchandanalysisofelectromagnetictrojandetectionbasedondeeplearning |
_version_ |
1715013503969918976 |