留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于融合特征的泄漏信号分类识别方法

寇云峰 戴飞 赵治国 吕剑明 马谢

寇云峰, 戴飞, 赵治国, 等. 基于融合特征的泄漏信号分类识别方法[J]. 强激光与粒子束, 2024, 36: 043018. doi: 10.11884/HPLPB202436.230186
引用本文: 寇云峰, 戴飞, 赵治国, 等. 基于融合特征的泄漏信号分类识别方法[J]. 强激光与粒子束, 2024, 36: 043018. doi: 10.11884/HPLPB202436.230186
Kou Yunfeng, Dai Fei, Zhao Zhiguo, et al. Leakage signal classification and recognition method based on fusion features[J]. High Power Laser and Particle Beams, 2024, 36: 043018. doi: 10.11884/HPLPB202436.230186
Citation: Kou Yunfeng, Dai Fei, Zhao Zhiguo, et al. Leakage signal classification and recognition method based on fusion features[J]. High Power Laser and Particle Beams, 2024, 36: 043018. doi: 10.11884/HPLPB202436.230186

基于融合特征的泄漏信号分类识别方法

doi: 10.11884/HPLPB202436.230186
详细信息
    作者简介:

    寇云峰,4156512@qq.com

  • 中图分类号: TN924;TP181

Leakage signal classification and recognition method based on fusion features

  • 摘要: 随着移动通信、物联网、车联网、工业互联网等网络的发展,电磁环境日益复杂,非法电子设备也日渐增多,各类信号耦合互调现象严重,这给泄漏信号类型识别带来了难题。提出基于融合特征的泄漏信号分类识别方法,综合运用高维度特征提取方法和图形化降维表征方法,结合残差网络等深度学习模型与特征融合分析方法,能够更综合地区分多类电磁泄漏信号,特征抗噪声鲁棒性高,方法可解释性好,可支撑基于电磁信号类型识别的辐射源智能检测工程应用。
  • 图  1  算法流程图

    Figure  1.  Algorithm flowchart

    图  2  小波特征投影图

    Figure  2.  Wavelet feature projection

    图  3  Hilbert特征投影图

    Figure  3.  Hilbert characteristic projection map

    图  4  双谱特征投影图

    Figure  4.  Bispectral feature projection maps

    图  5  信噪比为0 dB时基于融合特征的预测结果混淆矩阵

    Figure  5.  Confusion matrix of prediction results based on fusion features when the signal-to-noise ratio is 0 dB

    图  6  不同信噪比时基于小波特征的预测结果混淆矩阵

    Figure  6.  Confusion matrix of prediction results based on wavelet features at different signal-to-noise ratios

    图  7  不同信噪比时基于HHT特征的预测结果混淆矩阵

    Figure  7.  Confusion matrix of prediction results based on HHT features at different signal-to-noise ratios

    表  1  五类泄漏源

    Table  1.   Five types of leakage sources

    No.signal typetotal sampling points
    of each WAV file
    number of samples
    intercepted by each WAV file
    total number of
    samples taken
    1clock leak signal11264000,10035200, 7168000 ,7782400563,501,358,3891811
    2laptop touchpad leak signal12247040,15589376, 17924096,21274624612,779,896,10633350
    3environmental radio
    emissions signal
    17981440,22003712,25976832, 25075712 ,15302656899,1100,1298,1253,7655315
    4screen display signal21553152,34586624,267223041077,1729,13364142
    5unknown radiation source signal15728640,17661952, 26402816,16826368786,883,1320,8413830
    下载: 导出CSV

    表  2  五类泄漏源特征

    Table  2.   Five types of leak source characteristics

    No.signal typewavelet feature mapHHT feature mapbispectral feature map
    1clock leak signal
    2laptop touchpad
    leak signal
    3environmental radio
    emissions signal
    4screen display signal
    5unknown radiation
    source signal
    下载: 导出CSV

    表  3  五类泄漏源样本数据集数量

    Table  3.   Number of sample data sets of five types of leakage sources

    No.signal typebalanced dataset sample sizeunbalanced dataset sample size
    training settest settraining settest set
    1 clock leak signal 1440 360 1449 362
    2 laptop touchpad leak signal 1440 360 2680 670
    3 environmental radio emissions signal 1440 360 4252 1063
    4 screen display signal 1440 360 3313 829
    5 unknown radiation source signal 1440 360 3064 766
    下载: 导出CSV

    表  4  不同信噪比下的不同特征图预测准确率

    Table  4.   Prediction accuracy of different feature maps under different signal-to-noise ratios

    No.SNR/dBfusion feature map/%wavelet feature map/%HHT feature map/%bispectral feature map/%
    1099.895.895.2100
    2310098.497.8100
    3510093.698.8100
    4710093.099.8100
    下载: 导出CSV
  • [1] 刘文斌, 丁建锋, 寇云峰, 等. 物理隔离网络电磁漏洞研究[J]. 强激光与粒子束, 2019, 31:103215 doi: 10.11884/HPLPB201931.190132

    Liu Wenbin, Ding Jianfeng, Kou Yunfeng, et al. Research on electromagnetic vulnerability of air-gapped network[J]. High Power Laser and Particle Beams, 2019, 31: 103215 doi: 10.11884/HPLPB201931.190132
    [2] 刘文斌, 王梦寒, 寇云峰, 等. 基于电磁泄漏信号的电子设备行为识别与安全应用[J]. 通信技术, 2019, 52(7):1761-1765 doi: 10.3969/j.issn.1002-0802.2019.07.038

    Liu Wenbin, Wang Menghan, Kou Yunfeng, et al. Behavior recognition and security application of electronic equipment based on electromagnetic leakage signal[J]. Communications Technology, 2019, 52(7): 1761-1765 doi: 10.3969/j.issn.1002-0802.2019.07.038
    [3] 刘文斌, 丁建锋, 寇云峰, 等. 软件定义电磁泄漏技术与应用分析[J]. 通信技术, 2017, 50(9):2094-2099 doi: 10.3969/j.issn.1002-0802.2017.09.035

    Liu Wenbin, Ding Jianfeng, Kou Yunfeng, et al. Software-defined electromagnetic leakage technology and its application[J]. Communications Technology, 2017, 50(9): 2094-2099 doi: 10.3969/j.issn.1002-0802.2017.09.035
    [4] 王梦寒, 寇云峰, 刘文斌, 等. 计算机网络电磁泄漏信号的实时监测与智能识别[J]. 通信技术, 2019, 52(7):1755-1760 doi: 10.3969/j.issn.1002-0802.2019.07.037

    Wang Menghan, Kou Yunfeng, Liu Wenbin, et al. Real-time monitoring and intelligent recognition of electromagnetic leakage signals in computer networks[J]. Communications Technology, 2019, 52(7): 1755-1760 doi: 10.3969/j.issn.1002-0802.2019.07.037
    [5] 关天敏, 韩振中, 茅剑. 显示器电磁信息泄漏的机器学习检测方法研究[J]. 信息安全学报, 2021, 6(2):101-109 doi: 10.19363/J.cnki.cn10-1380/tn.2021.03.07

    Guan Tianmin, Han Zhenzhong, Mao Jian. Research on the detection method of electromagnetic information leakage from display by machine learning[J]. Journal of Cyber Security, 2021, 6(2): 101-109 doi: 10.19363/J.cnki.cn10-1380/tn.2021.03.07
    [6] 徐艳云, 张萌, 黄伟庆. 信息设备电磁辐射信息泄漏的可检测距离估计方法研究[J]. 信息安全学报, 2020, 5(1):44-56 doi: 10.19363/J.cnki.cn10-1380/tn.2020.01.05

    Xu Yanyun, Zhang Meng, Huang Weiqing. Study on detectable distance for electromagnetic information leakage of information equipment[J]. Journal of Cyber Security, 2020, 5(1): 44-56 doi: 10.19363/J.cnki.cn10-1380/tn.2020.01.05
    [7] Sehatbakhsh N, Nazari A, Alam M, et al. REMOTE: robust external malware detection framework by using electromagnetic signals[J]. IEEE Transactions on Computers, 2020, 69(3): 312-326. doi: 10.1109/TC.2019.2945767
    [8] Werner F T, Yilmaz B B, Prvulovic M, et al. Leveraging EM side-channels for recognizing components on a motherboard[J]. IEEE Transactions on Electromagnetic Compatibility, 2021, 63(2): 502-515. doi: 10.1109/TEMC.2020.3016892
    [9] Jorgensen E J, Werner F T, Prvulovic M, et al. Deep learning classification of motherboard components by leveraging EM side-channel signals[J]. Journal of Hardware and Systems Security, 2021, 5(2): 114-126. doi: 10.1007/s41635-021-00116-2
    [10] 丁建锋, 刘文斌, 丁磊, 等. 基于主动检测的电子设备电磁信息泄漏新型威胁分析[J]. 通信技术, 2018, 51(4):936-940 doi: 10.3969/j.issn.1002-0802.2018.04.035

    Ding Jianfeng, Liu Wenbin, Ding Lei, et al. New threat analysis of electromagnetic information leakage in electronic equipment based on active detection[J]. Communications Technology, 2018, 51(4): 936-940 doi: 10.3969/j.issn.1002-0802.2018.04.035
    [11] 丁建锋, 刘文斌, 王梦寒, 等. 计算机声光电磁信号互调泄漏威胁分析[J]. 通信技术, 2019, 52(4):967-970 doi: 10.3969/j.issn.1002-0802.2019.04.034

    Ding Jianfeng, Liu Wenbin, Wang Menghan, et al. Threat analysis of computer information leakage in intermodulation of acoustic, optical and electromagnetic signals[J]. Communications Technology, 2019, 52(4): 967-970 doi: 10.3969/j.issn.1002-0802.2019.04.034
    [12] 程磊, 罗儒俊, 寇云峰, 等. 基于电源线的传导电磁信息泄漏模型与验证[J]. 通信技术, 2018, 51(4):941-946 doi: 10.3969/j.issn.1002-0802.2018.04.036

    Cheng Lei, Luo Rujun, Kou Yunfeng, et al. Verification of conductive electromagnetic information leakage model based on power line[J]. Communications Technology, 2018, 51(4): 941-946 doi: 10.3969/j.issn.1002-0802.2018.04.036
    [13] 齐国雷, 寇云峰, 胡浩, 等. 基于隐蔽声通道的物理隔离计算机信息泄漏研究[J]. 通信技术, 2018, 51(3):700-704 doi: 10.3969/j.issn.1002-0802.2018.03.036

    Qi Guolei, Kou Yunfeng, Hu Hao, et al. Information leakage based on acoustic convert channel for air-gapped computers[J]. Communications Technology, 2018, 51(3): 700-704 doi: 10.3969/j.issn.1002-0802.2018.03.036
    [14] 胡浩, 罗儒俊, 齐国雷, 等. 基于LED显示屏的隐蔽光传输通道[J]. 通信技术, 2018, 51(7):1689-1693 doi: 10.3969/j.issn.1002-0802.2018.07.032

    Hu Hao, Luo Rujun, Qi Guolei, et al. Covert-optical transmission channel based on LED display[J]. Communications Technology, 2018, 51(7): 1689-1693 doi: 10.3969/j.issn.1002-0802.2018.07.032
    [15] Guri M, Zadov B, Bykhovsky D, et al. PowerHammer: Exfiltrating data from air-gapped computers through power lines[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 1879-1890. doi: 10.1109/TIFS.2019.2952257
  • 加载中
图(7) / 表(4)
计量
  • 文章访问数:  280
  • HTML全文浏览量:  69
  • PDF下载量:  26
  • 被引次数: 0
出版历程
  • 收稿日期:  2023-06-19
  • 修回日期:  2023-09-21
  • 录用日期:  2023-08-29
  • 网络出版日期:  2023-09-11
  • 刊出日期:  2024-02-29

目录

    /

    返回文章
    返回