How to find a GSMem malicious activity via an AI approach

نویسندگان

  • Weijun Zhu
  • ShaoHuan Ban
  • YongWen Fan
چکیده

This paper investigates the following problem: how to find a GSMem malicious activity effectively. To this end, this paper puts forward a new method based on Artificial Intelligence (AI). At first, we use a large quantity of data in terms of frequencies and amplitudes of some electromagnetic waves to train our models. And then, we input a given frequency and amplitude into the obtained models, predicting that whether a GSMem malicious activity occurs or not. The simulated experiments show that the new method is potential to detect a GSMem one, with low False Positive Rates (FPR) and low False Negative Rates (FNR).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An automated approach to analysis and classification of Crypto-ransomwares’ family

There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...

متن کامل

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Soft Computing Techniques in Cyber Defense

Artificial intelligence is a technology to make the machines human compatible. Various techniques likeheuristic search (Generate and test, Hill climbing, BFS, DFS, Problem reduction, constraint satisfaction, means-ends analysis etc.), game playing, understanding, planning, NLP, Learning, commonsense, predictions and actions, and expert systems are there to make the system intelligent. This pape...

متن کامل

A Fault Tolerance Approach to Survivability

Attacks on computer systems have received a great deal of press attention; however, most of the focus has been on how an attacker can disrupt an organization’s operations. Although attack prevention is clearly preferred, preventive measures do fail, and some attacks inevitably succeed in compromising some or all of particular systems. We adopt a fault tolerance approach that addresses all phase...

متن کامل

Laboratory Methodologic Approach in Prolonged Activated Partial Thromboplastin Time Test

The pathological activated partial thromboplastin time test is a data that we can find in all clinical laboratories routinely. The hemato-coagulative clinical case here reported aims to point out how the laboratory can provide a correct diagnosis by methodological rational setting and, consequently, carry out an appropriate therapy, or reassure the patient that the pathological data will not ca...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1801.02440  شماره 

صفحات  -

تاریخ انتشار 2018