Does X-PHY® AI Embedded Cyber Secure SSD prevent an authorized user from bad behaviour?

Modified on Tue, 11 Jun at 2:05 PM

Within the NVMe protocol, it is narrowed down to 2 commands, Read/Write.

During the direct access to the SSD from the host, we build a virtual table to list all logical block addresses, and each LBA has a sub-table to see how many are written and overwritten during a period of time. This information will help to create attributes. We then apply the fast fourier transformation (FFT) to convert it from time domain to frequency domain. After so, we generate power spectrum estimation which is unique for different applications. Based on this spectrum we create a unique pattern for AI training for any similarity’s patterns during the real time protection.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article