Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning

The electromagnetic Trojan attack can break through the physical isolation to attack, and the leaked channel does not use the system network resources, which makes the traditional firewall and other intrusion detection devices unable to effectively prevent. Based on the existing research results, th...

Full description

Bibliographic Details
Main Authors: Jiazhong Lu, Xiaolei Liu, Shibin Zhang, Yan Chang
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2020/6641844
id doaj-722c3d4060e9472fbabaf81478b54633
record_format Article
spelling doaj-722c3d4060e9472fbabaf81478b546332020-12-07T09:08:22ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/66418446641844Research and Analysis of Electromagnetic Trojan Detection Based on Deep LearningJiazhong Lu0Xiaolei Liu1Shibin Zhang2Yan Chang3School of Cybersecurity, Chengdu University of Information Technology, Chengdu 610225, Sichuan, ChinaInstitute of Computer Application, China Academy of Engineering Physics, Mianyang, Sichuan 621900, ChinaSchool of Cybersecurity, Chengdu University of Information Technology, Chengdu 610225, Sichuan, ChinaSchool of Cybersecurity, Chengdu University of Information Technology, Chengdu 610225, Sichuan, ChinaThe electromagnetic Trojan attack can break through the physical isolation to attack, and the leaked channel does not use the system network resources, which makes the traditional firewall and other intrusion detection devices unable to effectively prevent. Based on the existing research results, this paper proposes an electromagnetic Trojan detection method based on deep learning, which makes the work of electromagnetic Trojan analysis more intelligent. First, the electromagnetic wave signal is captured using software-defined radio technology, and then the signal is initially filtered in combination with a white list, a demodulated signal, and a rate of change in intensity. Secondly, the signal in the frequency domain is divided into blocks in a time-window mode, and the electromagnetic signals are represented by features such as time, information amount, and energy. Finally, the serialized signal feature vector is further extracted using the LSTM algorithm to identify the electromagnetic Trojan. This experiment uses the electromagnetic Trojan data published by Gurion University to test. And it can effectively defend electromagnetic Trojans, improve the participation of computers in electromagnetic Trojan detection, and reduce the cost of manual testing.http://dx.doi.org/10.1155/2020/6641844
collection DOAJ
language English
format Article
sources DOAJ
author Jiazhong Lu
Xiaolei Liu
Shibin Zhang
Yan Chang
spellingShingle Jiazhong Lu
Xiaolei Liu
Shibin Zhang
Yan Chang
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning
Security and Communication Networks
author_facet Jiazhong Lu
Xiaolei Liu
Shibin Zhang
Yan Chang
author_sort Jiazhong Lu
title Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning
title_short Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning
title_full Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning
title_fullStr Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning
title_full_unstemmed Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning
title_sort research and analysis of electromagnetic trojan detection based on deep learning
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2020-01-01
description The electromagnetic Trojan attack can break through the physical isolation to attack, and the leaked channel does not use the system network resources, which makes the traditional firewall and other intrusion detection devices unable to effectively prevent. Based on the existing research results, this paper proposes an electromagnetic Trojan detection method based on deep learning, which makes the work of electromagnetic Trojan analysis more intelligent. First, the electromagnetic wave signal is captured using software-defined radio technology, and then the signal is initially filtered in combination with a white list, a demodulated signal, and a rate of change in intensity. Secondly, the signal in the frequency domain is divided into blocks in a time-window mode, and the electromagnetic signals are represented by features such as time, information amount, and energy. Finally, the serialized signal feature vector is further extracted using the LSTM algorithm to identify the electromagnetic Trojan. This experiment uses the electromagnetic Trojan data published by Gurion University to test. And it can effectively defend electromagnetic Trojans, improve the participation of computers in electromagnetic Trojan detection, and reduce the cost of manual testing.
url http://dx.doi.org/10.1155/2020/6641844
work_keys_str_mv AT jiazhonglu researchandanalysisofelectromagnetictrojandetectionbasedondeeplearning
AT xiaoleiliu researchandanalysisofelectromagnetictrojandetectionbasedondeeplearning
AT shibinzhang researchandanalysisofelectromagnetictrojandetectionbasedondeeplearning
AT yanchang researchandanalysisofelectromagnetictrojandetectionbasedondeeplearning
_version_ 1715013503969918976