Skip to content

🛡 A brief introduction and theoretical research of computer virus weapons, and the simulation of its basic framework and functions.

License

Notifications You must be signed in to change notification settings

Rc-W024/CyberAttk-SP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

50 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Signal Theory in Information Security and Cyber Attacks

Research on Virus Cyberattack-Defense Based on Electromagnetic Radiation

In this project, firstly, the mathematical model of computer virus propagation is studied, and the characteristics of virus propagation are analyzed through the simulation curve. Then, a basic framework for modulating computer virus code converted into a binary data stream into the transmitted signal of an echo-free radar (radio transmitter) is simulated, aiming to study signal processing techniques related to cyberattacks and defense, as well as the feasibility of radiation injection.

本项目首先研究了计算机病毒传播的数学模型,并通过仿真曲线图分析了病毒传播的特性。随后,模拟了将被转换为二进制数据流的计算机病毒代码调制到雷达(无线电发射机)的发射信号中的简单框架,旨在研究用于网络攻防领域的相关信号处理技术,并讨论此类辐射注入的可行性。

In this case, Frequency Shift Keying (FSK) is used. In addition, phase shift keying (PSK), amplitude modulation (AM), phase modulation (PM), and quadrature amplitude modulation (QAM) can also be selected according to the actual situation.

在本例中,使用了键控频移调制的方式。除此之外,还可根据实际情况选择相移键控、调幅、调相和正交调幅等方式。

Code details...

Propagation mathematical model

sim_propagation.m: Computer virus propagation simulation for printing the propagation curve.

计算机病毒传播模型仿真及绘制计算机网络中病毒的传播曲线图:

Mathematical expectation: $E\left (X_{n}\right )=\frac{N}{1+\left (\frac{N}{X_{0}}-1\right )e^{-n\frac{M}{N}}}=\frac{N}{1+\left (N-1\right )e^{-n\frac{M}{N}}}$

Please find the details in the arXiv paper: arXiv:2306.17508v1 [cs.CR]

Signal modulation

This script (virus_sig.m) is a simple simulation program for modulating computer virus signal. It is mainly divided into the following four parts:

This code is a simulation of a computer virus attack and it involves signal modulation techniques.

Step 1: Generate a random code data stream to simulate the computer virus.
生成一个随机的代码数据流来模拟计算机病毒。

Step 2: Carrier signal generation. A carrier signal with fc using the cosine function.
生成载波信号,并生成一个频率为fc的载波(余弦)信号。

Step 3: FSK modulation. For each binary data bit, if its value is $0$, set the frequency of the carrier signal to $f_{c}-bitRate/2$; if the value is $1$, set the frequency to $f_{c}+bitRate/2$, to generate the modulated signal. Finally, the modulation signal is added to the carrier signal to generate the signal to be emitted.
FSK调制。对于每个二进制数据位,如果它的值为 $0$ ,则将载波信号的频率设置为 $f_{c}-bitRate/2$ ;如果值为 $1$ ,则将载波信号的频率设置为 $f_{c}+bitRate/2$ ,从而生成调制信号。最后,将调制信号与载波信号相加,生成待发射信号。

FYI

Citation:

@article{wu2023cybersp,
 title={Research on Virus Cyberattack-Defense Based on Electromagnetic Radiation}, 
 author={Ruochen Wu},
 year={2023},
 number={2306.17508},
 journal={arXiv},
 issn={2331-8422},
 url={https://doi.org/10.48550/arXiv.2306.17508},
 doi={10.48550/arXiv.2306.17508},
 primaryClass={cs.CR}
}

Releases

No releases published

Packages

No packages published

Languages