• Title/Summary/Keyword: Fake

Search Result 343, Processing Time 0.029 seconds

How Do Children Interact with Phishing Attacks?

  • Alwanain, Mohammed I
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.127-133
    • /
    • 2021
  • Today, phishing attacks represent one of the biggest security threats targeting users of the digital world. They consist of an attempt to steal sensitive information, such as a user's identity or credit and debit card details, using various methods that include fake emails, fake websites, and fake social media messages. Protecting the user's security and privacy therefore becomes complex, especially when those users are children. Currently, children are participating in Internet activity more frequently than ever before. This activity includes, for example, online gaming, communication, and schoolwork. However, children tend to have a less well-developed knowledge of privacy and security concepts, compared to adults. Consequently, they often become victims of cybercrime. In this paper, the effects of security awareness on users who are children are investigated, looking at their ability to detect phishing attacks in social media. In this approach, two Experiments were conducted to evaluate the effects of security awareness on WhatsApp application users in their daily communication. The results of the Experiments revealed that phishing awareness training has a significant positive effect on the ability of children using WhatsApp to identify phishing messages and thereby avoid attacks.

Multi-modal Authentication Using Score Fusion of ECG and Fingerprints

  • Kwon, Young-Bin;Kim, Jason
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.2
    • /
    • pp.132-146
    • /
    • 2020
  • Biometric technologies have become widely available in many different fields. However, biometric technologies using existing physical features such as fingerprints, facial features, irises, and veins must consider forgery and alterations targeting them through fraudulent physical characteristics such as fake fingerprints. Thus, a trend toward next-generation biometric technologies using behavioral biometrics of a living person, such as bio-signals and walking characteristics, has emerged. Accordingly, in this study, we developed a bio-signal authentication algorithm using electrocardiogram (ECG) signals, which are the most uniquely identifiable form of bio-signal available. When using ECG signals with our system, the personal identification and authentication accuracy are approximately 90% during a state of rest. When using fingerprints alone, the equal error rate (EER) is 0.243%; however, when fusing the scores of both the ECG signal and fingerprints, the EER decreases to 0.113% on average. In addition, as a function of detecting a presentation attack on a mobile phone, a method for rejecting a transaction when a fake fingerprint is applied was successfully implemented.

Harmful Disinformation in Southeast Asia: "Negative Campaigning", "Information Operations" and "Racist Propaganda" - Three Forms of Manipulative Political Communication in Malaysia, Myanmar, and Thailand

  • Radue, Melanie
    • Journal of Contemporary Eastern Asia
    • /
    • v.18 no.2
    • /
    • pp.68-89
    • /
    • 2019
  • When comparing media freedom in Malaysia, Myanmar, and Thailand, so-called "fake news" appears as threats to a deliberative (online) public sphere in these three diverse contexts. However, "racist propaganda", "information operations" and "negative campaigning" might be more accurate terms that explain these forms of systematic manipulative political communication. The three cases show forms of disinformation in under-researched contexts and thereby expand the often Western focused discourses on hate speech and fake news. Additionally, the analysis shows that harmful disinformation disseminated online originates from differing contextual trajectories and is not an "online phenomenon". Drawing on an analysis of connotative context factors, this explorative comparative study enables an understanding of different forms of harmful disinformation in Malaysia, Myanmar, and Thailand. The connotative context factors were inductively inferred from 32 expert interviews providing explanations for the formation of political communication (control) mechanisms.

Design and Implementation of FakePort for Efficient Port Control Based on Linux Server (리눅스 서버의 효율적인 포트제어를 위한 페이크포트 설계 및 구현)

  • 김완경;소우영;김환국;서동일
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.319-324
    • /
    • 2004
  • Internet is spread by the rapid development of information telecommunication infrastructure. But there are swinging damages becuase of most of the user has a shortage of knowledge. Especially, in proportion to increase of Linux user as PC, that is exposed to various threatener and is target of malicious attacker. In this paper, design and implement Fakeport based on Linux to control port efficiently and easily for protection against attack.

  • PDF

Anti-Spoofing Method for Iris Recognition by Combining the Optical and Textural Features of Human Eye

  • Lee, Eui Chul;Son, Sung Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2424-2441
    • /
    • 2012
  • In this paper, we propose a fake iris detection method that combines the optical and textural features of the human eye. To extract the optical features, we used dual Purkinje images that were generated on the anterior cornea and the posterior lens surfaces based on an analytic model of the human eye's optical structure. To extract the textural features, we measured the amount of change in a given iris pattern (based on wavelet decomposition) with regard to the direction of illumination. This method performs the following two procedures over previous researches. First, in order to obtain the optical and textural features simultaneously, we used five illuminators. Second, in order to improve fake iris detection performance, we used a SVM (Support Vector Machine) to combine the optical and textural features. Through combining the features, problems of single feature based previous works could be solved. Experimental results showed that the EER (Equal Error Rate) was 0.133%.

Fake Discrimination using Time Information in CNN-based Signature Recognition (CNN 기반 서명인식에서 시간정보를 이용한 위조판별)

  • Choi, Seouing-Ho;Jung, Sung Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.293-294
    • /
    • 2017
  • 본 논문에서는 CNN 기반 서명인식에서 시간정보를 이용하여 위조서명을 보다 정확하게 판별하는 방법을 제안한다. 시간정보를 이용하는 첫 번째 방법은 서명하는 전체 시간을 동일한 개수의 등 간격으로 나누어 각각의 이미지를 얻고 이를 합성하여 이용하는 방법이다. 두 번째 방법은 동일한 개수의 등 간격으로 나누어진 각각의 이미지를 CNN-LSTM 으로 판별하는 방법이다. 동일한 개수의 등 간격으로 나누어진 이미지들에는 서명의 속도에 따른 모양의 차이가 발생하기 때문에 비록 최종 서명의 모양이 원본과 매우 유사하다고 하더라도 속도가 다른 경우 위조임을 판별할 수 있다. 두 명의 서명에 대하여 실험을 한 결과 최종 서명이 매우 유사하더라도 속도가 다른 경우 위조로 판별할 수 있음을 보였다. 다만 이미지 합성 과정에 만들어진 새로운 정보로 인하여 진짜 서명을 가짜로 판별할 수 있는 가능성도 늘어날 수 있음을 확인하였다.

  • PDF

A Research on Gender Analysis of BGP Security (BGP의 보안성에 대한 기존 연구 분석)

  • Sun, Jae-Hoon;Kim, Yong-Ho;Sun, Yong-Bin
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.35-41
    • /
    • 2009
  • Internet routing protocols currently in use in the typical protocol of the existing BGP protocol to strengthen the security of the BGP protocol by comparison with research on emerging issues of the AS-Path, IP Fake, DRDoS BGP protocol must be used when such the information you need, but due to malicious attack, or an incorrect setting can prevent the global Internet network operating in an security to threat information are analyzed.

  • PDF

Toward Trustworthy Social Network Services: A Robust Design of Recommender Systems

  • Noh, Giseop;Oh, Hayoung;Lee, Kyu-haeng;Kim, Chong-kwon
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.145-156
    • /
    • 2015
  • In recent years, electronic commerce and online social networks (OSNs) have experienced fast growth, and as a result, recommendation systems (RSs) have become extremely common. Accuracy and robustness are important performance indexes that characterize customized information or suggestions provided by RSs. However, nefarious users may be present, and they can distort information within the RSs by creating fake identities (Sybils). Although prior research has attempted to mitigate the negative impact of Sybils, the presence of these fake identities remains an unsolved problem. In this paper, we introduce a new weighted link analysis and influence level for RSs resistant to Sybil attacks. Our approach is validated through simulations of a broad range of attacks, and it is found to outperform other state-of-the-art recommendation methods in terms of both accuracy and robustness.

Design and Implementation of High-availability System (임무컴퓨터를 위한 고가용 시스템의 설계 및 구현)

  • Jeong, Jae-Yeop;Lee, Cheol-Hoon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.529-533
    • /
    • 2008
  • Mission Computer performs important role both managing a whole system and dealing with a specific mission in avionics system. In general, the fault of SPOF(Single Point Of Failure) in unity system can lead to failure of whole system. It can cause a failure of a mission and also can threaten to the life of the pilot. So, in this paper, we design the HA(High-availability) system so that dealing with the failure. And we use HA software like Heartbeat, Fake, DRBD and Bonding to managing HA system.

  • PDF

Research of method prevent to illegal use of Credit Card (신용카드 부정사용 거래 예방을 위한 대처 방안 연구)

  • Pu, Chang Hee;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.147-156
    • /
    • 2012
  • Most people in our society use credit card instead of cash or check, so credit card is very important economic method. Credit card supposed to be safe, but hackers hack credit card for illegal deal. Also hackers make fake credit card and issue fake credit card to other people. In this thesis it will study and analyze damage case for safe credit card deal. It will use safe credit card system to insert variety of information and data of using pattern in artificial intelligence network, so print out the possibility of risk and monitor the risk of credit card user's deal pattern, so if one of user's pattern is different than normal pattern, it will pop up message in consultant's screen. This thesis will study and suggest way of prevent from illegal deal and user friendly credit card checking system.