• Title/Summary/Keyword: Fake Information

Search Result 214, Processing Time 0.026 seconds

A Highly Secure Identity-Based Authenticated Key-Exchange Protocol for Satellite Communication

  • Yantao, Zhong;Jianfeng, Ma
    • Journal of Communications and Networks
    • /
    • v.12 no.6
    • /
    • pp.592-599
    • /
    • 2010
  • In recent years, significant improvements have been made to the techniques used for analyzing satellite communication and attacking satellite systems. In 2003, a research team at Los Alamos National Laboratory, USA, demonstrated the ease with which civilian global positioning system (GPS) spoofing attacks can be implemented. They fed fake signals to the GPS receiver so that it operates as though it were located at a position different from its actual location. Moreover, Galileo in-orbit validation element A and Compass-M1 civilian codes in all available frequency bands were decoded in 2007 and 2009. These events indicate that cryptography should be used in addition to the coding technique for secure and authenticated satellite communication. In this study, we address this issue by using an authenticated key-exchange protocol to build a secure and authenticated communication channel for satellite communication. Our protocol uses identity-based cryptography. We also prove the security of our protocol in the extended Canetti-Krawczyk model, which is the strongest security model for authenticated key-exchange protocols, under the random oracle assumption and computational Diffie-Hellman assumption. In addition, our protocol helps achieve high efficiency in both communication and computation and thus improve security in satellite communication.

Development and Application of Ethics Education STEAM Projects using DeepFake Apps (딥페이크 앱 활용 윤리교육 융합 프로젝트의 개발 및 적용)

  • Hwang, Jung;Choe, Eunjeong;Han, Jeonghye
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.2
    • /
    • pp.405-412
    • /
    • 2021
  • To prevent problems such as portrait rights, copyright, and cyber violence, an ethics education STEAM projects using deepfake apps using AI technology were developed and applied. The Deepfake apps were screened, and the contents of the elementary school curriculum were reconstructed. The STEAM project as creative experiential activities was mainly operated by the UCC activities, and applied the info-ethics awareness measurement test based on the planned behavior theory. The social STEAM project as money (financial) education was qualitatively analyzed. It was found that this STEAM classes using AI technology app significantly enhances the ethical awareness of information communication.

Google Play Malware Detection based on Search Rank Fraud Approach

  • Fareena, N;Yogesh, C;Selvakumar, K;Sai Ramesh, L
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3723-3737
    • /
    • 2022
  • Google Play is one of the largest Android phone app markets and it contains both free and paid apps. It provides a variety of categories for every target user who has different needs and purposes. The customer's rate every product based on their experience of apps and based on the average rating the position of an app in these arch varies. Fraudulent behaviors emerge in those apps which incorporate search rank maltreatment and malware proliferation. To distinguish the fraudulent behavior, a novel framework is structured that finds and uses follows left behind by fraudsters, to identify both malware and applications exposed to the search rank fraud method. This strategy correlates survey exercises and remarkably joins identified review relations with semantic and behavioral signals produced from Google Play application information, to distinguish dubious applications. The proposed model accomplishes 90% precision in grouping gathered informational indexes of malware, fakes, and authentic apps. It finds many fraudulent applications that right now avoid Google Bouncers recognition technology. It also helped the discovery of fake reviews using the reviewer relationship amount of reviews which are forced as positive reviews for each reviewed Google play the android app.

A Study on Countermeasures through Messenger Phishing Experience Analysis (메신저피싱 경험사례 분석을 통한 대응방안 연구)

  • Nam, Sowon;Lee, Haksun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.791-805
    • /
    • 2022
  • In recent years, the number of scams related to voice phishing has been on the decline, but the number of messenger phishing attacks, a new type of crime, is increasing. In this study, by analyzing SNS posts containing messenger phishing cases, criminal trends of the main methods, imposture of trusted relative and fake payment were identified. Through the analysis, main words and patterns composing the message and the similarity and continuity of the phone numbers used were derived as criminal attributes, and criminal organizations were grouped. As the results of the analysis, we propose a cooperative system to prevent damage from messenger phishing by disseminating the criminal information collected by investigative agencies to private operators, and a plan to respond to messenger phishing predicted through grouping of criminal organizations.

Cascaded-Hop For DeepFake Videos Detection

  • Zhang, Dengyong;Wu, Pengjie;Li, Feng;Zhu, Wenjie;Sheng, Victor S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1671-1686
    • /
    • 2022
  • Face manipulation tools represented by Deepfake have threatened the security of people's biological identity information. Particularly, manipulation tools with deep learning technology have brought great challenges to Deepfake detection. There are many solutions for Deepfake detection based on traditional machine learning and advanced deep learning. However, those solutions of detectors almost have problems of poor performance when evaluated on different quality datasets. In this paper, for the sake of making high-quality Deepfake datasets, we provide a preprocessing method based on the image pixel matrix feature to eliminate similar images and the residual channel attention network (RCAN) to resize the scale of images. Significantly, we also describe a Deepfake detector named Cascaded-Hop which is based on the PixelHop++ system and the successive subspace learning (SSL) model. By feeding the preprocessed datasets, Cascaded-Hop achieves a good classification result on different manipulation types and multiple quality datasets. According to the experiment on FaceForensics++ and Celeb-DF, the AUC (area under curve) results of our proposed methods are comparable to the state-of-the-art models.

Facial Manipulation Detection with Transformer-based Discriminative Features Learning Vision (트랜스포머 기반 판별 특징 학습 비전을 통한 얼굴 조작 감지)

  • Van-Nhan Tran;Minsu Kim;Philjoo Choi;Suk-Hwan Lee;Hoanh-Su Le;Ki-Ryong Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.540-542
    • /
    • 2023
  • Due to the serious issues posed by facial manipulation technologies, many researchers are becoming increasingly interested in the identification of face forgeries. The majority of existing face forgery detection methods leverage powerful data adaptation ability of neural network to derive distinguishing traits. These deep learning-based detection methods frequently treat the detection of fake faces as a binary classification problem and employ softmax loss to track CNN network training. However, acquired traits observed by softmax loss are insufficient for discriminating. To get over these limitations, in this study, we introduce a novel discriminative feature learning based on Vision Transformer architecture. Additionally, a separation-center loss is created to simply compress intra-class variation of original faces while enhancing inter-class differences in the embedding space.

Development of a Standardized Framework for Domestic Information Security Education; Focusing on a Two-Track Curriculum Customized by Age and Job (국내 정보보호 교육 표준 프레임워크 개발; 연령 및 직무 맞춤의 이원화(Two-track) 교육과정을 중심으로)

  • Park, Minjung;Lee, GI Hyouk;Chai, Sangmi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1083-1095
    • /
    • 2021
  • With the recent increase in users' dependence on the Internet and the spread of various IT devices, the influence of information security on the users' has expanded compared to the past. Therefore, it is expected to have an increased influence on information security in personal life. In addition, as the intrusion factors that threaten security continue to become more advanced and diversified (eg., fake news, cyberbullying, identity theft), the need for nurturing information security experts is increasing. Furthermore, not only corporate information security workers, but also all individuals, cannot be free from the threat of information security. Therefore, it is necessary to prepare various information security education to improve information security awareness and induce proactive information security behaviors. In this study, characteristics of domestic and foreign information security education courses are analyzed and provide a standardized framework for information security education applicable to the domestic environment.

A Study on Strategic Management of Native Advertisement (네이티브 광고의 전략적 관리방안에 관한 연구)

  • Son, Jeyoung;Kang, Inwon
    • Management & Information Systems Review
    • /
    • v.38 no.1
    • /
    • pp.63-81
    • /
    • 2019
  • In order to overcome the disadvantages of banner ad, pop-up ad, interstitial ad, which are existing web advertisement forms, native ad is actively utilized. Native advertising is considered to be a useful advertising technique in that it can reduce users' rejection and attract attention. However, in recent years, there have been a lot of fake news and fake contents that have turned articles or video contents into advertisements. The purpose of this study is to understand how firms can coordinate and control native advertisements in a rational way. For this analysis, we conducted a survey of 308 social media users using quota sampling method. As a result of the verification, it was found that the more negative the perception of the evaluation of the advertisement, the less the level of persuasion about the advertisement and the negative impact on the website where the advertisement is exposed. In addition, this study examined the influence of the negative stimulus factors on the qualitative performance of the firm. As a result, it was found that source non-expert had the highest effect on skepticism on ad. Also, platform overflow has a direct effect on the evaluation of the website as well as the negative evaluation of the advertisement. Moreover, this study provides concrete implications for the subdivision market by verifying the differences between the paths according to the level of website involvement.

Design of Learning Achievement Evaluation Module of Intelligent Computer Assisted Instruction with Various Fuzzy Environment (다양한 퍼지 환경을 갖는 지능형 교수 시스템의 학습 성취도 평가 모듈 설계)

  • Won Sung-Hyun
    • Management & Information Systems Review
    • /
    • v.2
    • /
    • pp.311-334
    • /
    • 1998
  • By decreasing in CPU price and development of computer assembling technology, personal computer fake a good chance to accelerate its supply. Recently, as being introduced new computing technology so called multi media, teaming assist system which is based on single media such as studying book, cassette tape, video tape, or something else is rapidly being replaced by new assist education system based on multi media in which it is operated by the personal computer. In the computer assist education system, there is an evaluation module which appraise learner's study level into the next study strategy. At the view of this point, this part is very important. In this part, there are some factors like Importance, complexity, or difficulty which commonly include fuzzy factors in our surrounding. But until now, we are still out of the level to handle the evaluation module adequately among the some studies. In this study, we would like to suggest a new module that evaluate learning achievement of ICAI which have a variety of fuzzy environment. We combine Independent fuzzy environment like importance, complexity, difficulty into making total evaluation of learner's achievement. By the result, with expressing by linguistic form, this study can provide the theoretical basis in which we will be able to carry out sentence toward evaluation among elementary school.

  • PDF

Auto-configurable Security Mechanism for NFV

  • Kim, HyunJin;Park, PyungKoo;Ryou, Jaecheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.786-799
    • /
    • 2018
  • Recently, NFV has attracted attention as a next-generation network virtualization technology for hardware -independent and efficient utilization of resources. NFV is a technology that not only virtualize computing, server, storage, network resources based on cloud computing but also connect Multi-Tenant of VNFs, a software network function. Therefore, it is possible to reduce the cost for constructing a physical network and to construct a logical network quickly by using NFV. However, in NFV, when a new VNF is added to a running Tenant, authentication between VNFs is not performed. Because of this problem, it is impossible to identify the presence of Fake-VNF in the tenant. Such a problem can cause an access from malicious attacker to one of VNFs in tenant as well as other VNFs in the tenant, disabling the NFV environment. In this paper, we propose Auto-configurable Security Mechanism in NFV including authentication between tenant-internal VNFs, and enforcement mechanism of security policy for traffic control between VNFs. This proposal not only authenticate identification of VNF when the VNF is registered, but also apply the security policy automatically to prevent malicious behavior in the tenant. Therefore, we can establish an independent communication channel for VNFs and guarantee a secure NFV environment.