How to find a GSMem malicious activity via an AI approach
نویسندگان
چکیده
This paper investigates the following problem: how to find a GSMem malicious activity effectively. To this end, this paper puts forward a new method based on Artificial Intelligence (AI). At first, we use a large quantity of data in terms of frequencies and amplitudes of some electromagnetic waves to train our models. And then, we input a given frequency and amplitude into the obtained models, predicting that whether a GSMem malicious activity occurs or not. The simulated experiments show that the new method is potential to detect a GSMem one, with low False Positive Rates (FPR) and low False Negative Rates (FNR).
منابع مشابه
An automated approach to analysis and classification of Crypto-ransomwares’ family
There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...
متن کاملBeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...
متن کاملSoft Computing Techniques in Cyber Defense
Artificial intelligence is a technology to make the machines human compatible. Various techniques likeheuristic search (Generate and test, Hill climbing, BFS, DFS, Problem reduction, constraint satisfaction, means-ends analysis etc.), game playing, understanding, planning, NLP, Learning, commonsense, predictions and actions, and expert systems are there to make the system intelligent. This pape...
متن کاملA Fault Tolerance Approach to Survivability
Attacks on computer systems have received a great deal of press attention; however, most of the focus has been on how an attacker can disrupt an organization’s operations. Although attack prevention is clearly preferred, preventive measures do fail, and some attacks inevitably succeed in compromising some or all of particular systems. We adopt a fault tolerance approach that addresses all phase...
متن کاملLaboratory Methodologic Approach in Prolonged Activated Partial Thromboplastin Time Test
The pathological activated partial thromboplastin time test is a data that we can find in all clinical laboratories routinely. The hemato-coagulative clinical case here reported aims to point out how the laboratory can provide a correct diagnosis by methodological rational setting and, consequently, carry out an appropriate therapy, or reassure the patient that the pathological data will not ca...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1801.02440 شماره
صفحات -
تاریخ انتشار 2018