• 제목/요약/키워드: Fake response

검색결과 18건 처리시간 0.025초

데이터 마이닝을 활용한 가짜뉴스의 선제적 대응을 위한 연구 : M 온라인 커뮤니티 게시물을 중심으로 (A Study on the Preemptive Measure for Fake News Eradication Using Data Mining Algorithms : Focused on the M Online Community Postings)

  • 임문영;박승범
    • 한국IT서비스학회지
    • /
    • 제18권1호
    • /
    • pp.219-234
    • /
    • 2019
  • Fake news threaten democratic elections and causes social conflicts, resulting in major damage. However, the concept of fake news is hard to define, as there is a saying, "News is not fake, fake is not news." Fake news, however, has irreversible characteristics that can not be recovered or reversed completely through post-punishment of economic and political benefits. It is also rapidly spreading in the early days. Therefore, it is very important to preemptively detect these types of articles and prevent their blind proliferation. The existing countermeasures are focused on reporting fake news, raising the level of punishment, and the media & academia to determine the authenticity of the news. Researchers are also trying to determine the authenticity by analyzing its contents. Apart from the contents of fake news, determining the behavioral characteristics of the promoters and its qualities can help identify the possibility of having fake news in advance. The online community has a fake news interception and response tradition through its long-standing community-based activities. As a result, I attempted to model the fake news by analyzing the affirmation-denial analysis and posting behavior by securing the web board crawl of the 'M community' bulletin board during the 2017 Korean presidential election period. Random forest algorithm deemed significant. The results of this research will help counteract fake news and focus on preemptive blocking through behavioral analysis rather than post-judgment after semantic analysis.

Detecting Fake News about COVID-19 Infodemic Using Deep Learning and Content Analysis

  • Olga Chernyaeva;Taeho Hong;YongHee Kim;YoungKi Park;Gang Ren;Jisoo Ock
    • Asia pacific journal of information systems
    • /
    • 제32권4호
    • /
    • pp.945-963
    • /
    • 2022
  • With the widespread use of social media, online social platforms like Twitter have become a place of rapid dissemination of information-both accurate and inaccurate. After the COVID-19 outbreak, the overabundance of fake information and rumours on online social platforms about the COVID-19 pandemic has spread over society as quickly as the virus itself. As a result, fake news poses a significant threat to effective virus response by negatively affecting people's willingness to follow the proper public health guidelines and protocols, which makes it important to identify fake information from online platforms for the public interest. In this research, we introduce an approach to detect fake news using deep learning techniques, which outperform traditional machine learning techniques with a 93.1% accuracy. We then investigate the content differences between real and fake news by applying topic modeling and linguistic analysis. Our results show that topics on Politics and Government services are most common in fake news. In addition, we found that fake news has lower analytic and authenticity scores than real news. With the findings, we discuss important academic and practical implications of the study.

콘텐츠 중심 네트워킹 환경에서의 Fake Data Filtering Method 연구 (A Study on Fake Data Filtering Method of CCN)

  • 김대엽
    • 정보보호학회논문지
    • /
    • 제24권1호
    • /
    • pp.155-163
    • /
    • 2014
  • 네트워크 성능 향상을 위하여 콘텐츠 중심 네트워킹(CCN)은 콘텐츠 전송 경로 상에 있는 네트워크 중간 노드들이 중계하는 콘텐츠를 임시로 저장하고, 중간 노드가 임시 저장된 콘텐츠에 대한 요청 메시지 (Interest)를 수신하면, 해당 노드는 Interest를 콘텐츠 제공자에게 전송하지 않고, 임시 저장된 콘텐츠를 응답 메시지 (Data)로 콘텐츠 요청자에게 전송한다. 중간 노드에 의한 Interest 처리 방식은 효율적인 콘텐츠 전송을 가능케 할 뿐만 아니라 콘텐츠 제공자에게 집중되는 Interest를 분산 처리되게 함으로써 콘텐츠 제공자 또는 그 주변 네트워크 노드에서 발생하는 네트워크 병목현상을 효과적으로 해결할 수 있다. 이를 위하여 CCN 노드는 수신된 Data를 임시 저장하는 Content Store와 Data를 요청자에게 전송하기 위해 Interest 유입 경로를 저장/관리하는 Pending Interest Table (PIT)와 같은 자원을 추가적으로 운영한다. 그러나 공격 목표 노드에 대량의 Fake Interest을 전송하여 특정 노드의 PIT 자원을 고갈시켜 네트워킹을 방해하는 서비스 거부 공격에 대한 가능성이 제기 되었다. 본 논문에서는 앞서 제기된 Fake Interest를 이용한 PIT 공격 및 대응 방안을 살펴보고, Fake Data를 이용한 새로운 공격 방법 및 대응 방안을 제안한다. 또한, 제안된 방식을 시뮬레이션을 통하여 그 성능을 평가 한다.

품사별 출현 빈도를 활용한 코로나19 관련 한국어 가짜뉴스 탐지 (COVID-19-related Korean Fake News Detection Using Occurrence Frequencies of Parts of Speech)

  • 김지혁;안현철
    • 지능정보연구
    • /
    • 제29권2호
    • /
    • pp.267-283
    • /
    • 2023
  • 2019년 12월부터 현재까지 지속되고 있는 코로나19 팬데믹으로 인해 대중들은 감염병 대응을 위한 정보를 필요로 하게 되었다. 하지만 소셜미디어에서 유포되는 코로나19 관련 가짜뉴스로 인해 대중들의 건강이 심각하게 위협받고 있다. 특히 코로나19와 관련된 가짜뉴스가 유사한 내용으로 대량 유포될 경우 사실인지 거짓인지 진위를 가리기 위한 검증에 소요되는 시간이 길어지게 되어 우리 사회의 전반에 심각한 위협이 될 수 있다. 이에 학계에서는 신속하게 코로나19 관련 가짜뉴스를 탐지할 수 있는 지능형 모델에 대한 연구를 활발하게 수행해 오고 있으나, 대부분의 기존 연구에 사용된 데이터는 영문으로 구성되어 있어 한국어 가짜뉴스 탐지에 대한 연구는 매우 드문 실정이다. 이에 본 연구에서는 소셜 미디어 상에서 유포되는 한국어로 작성된 코로나19 관련 가짜뉴스 데이터를 직접 수집하고, 이를 기반으로 한 지능형 가짜뉴스 탐지 모델을 제안한다. 본 연구의 제안모델은 언어학적 특성 중 하나인 품사별 빈도 정보를 추가적으로 활용하여, 기존 연구에서 주로 사용되어 온 문서 임베딩 기법인 Doc2Vec 기반 가짜뉴스 탐지 모델의 예측 성능을 제고하고자 하였다. 실증분석 결과, 제안 모델이 비교 모델에 비해 Recall 및 F1 점수가 높아져 코로나19 관련 한국어 가짜뉴스를 보다 정확하게 판별함을 확인하였다.

가짜 광고성 피싱 사이트 탐지 모델 및 대응 기술 (Detection Models and Response Techniques of Fake Advertising Phishing Websites)

  • 이은빈;조정은;박원형
    • 융합보안논문지
    • /
    • 제23권3호
    • /
    • pp.29-36
    • /
    • 2023
  • 최근 검색 엔진에서의 가짜 광고성 피싱 사이트 노출이 급증하면서 검색 품질 악화 및 개인정보 유출로 인한 피해가 커지고 있다. 특히, ChatGPT와 같은 도구들을 통한 광고성 피싱 사이트 생성이 자동화될 가능성이 증가함에 따라 해당 문제의 심각성은 더욱 빠르게 악화되고 있다. 본 논문에서는 가짜 광고성 피싱 사이트의 소스 코드를 정적 분석하여 구조적 공통점을 도출하였고 그 중 외국 도메인, 리다이렉션을 바탕으로 사이트를 단계적으로 필터링하는 탐지 크롤러를 개발하여 최종적으로 가짜 광고성 게시물들이 탐지됨을 확인하였다. 또한, 가짜 광고성 사이트의 리다이렉션 페이지가 3가지의 유형으로 나뉘어 각 상황에 따라 다른 사이트를 반환하는 것을 검증함으로써 새로운 가이드라인의 필요성을 입증한다. 나아가 기존의 탐지 방법으로 탐지가 불가한 가짜 광고성 피싱 사이트를 대상으로 새로운 탐지 가이드라인을 제안한다.

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제11권2호
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

QR코드를 이용한 통합 교육 자격 입증 시스템 (Centralized Educational Certificate Authentication System Using QR Cod Tag)

  • 함디 압둘만;장종욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2017년도 춘계학술대회
    • /
    • pp.271-274
    • /
    • 2017
  • An educational institution issued a degree certificate to those students who have successfully completed all studies included in different levels of the degree program. The degree certificate presented by the University is of major significance in the person's life but the fabrication and circulation of fake certificates is inexpensive because a paper document can easily be forged with the availability of advance printing and copying technologies. So, there is a need to adopt a centralized authentication process that can verify and ensure the authenticity of a document. In order to prevent the spread of fake degree certificates a method is proposed where the integrity of the contents with in the certificate can be verified with the use of and Smart Phone Application. A Quick Response (QR) Code will contain a digital signature over the data such as degree holder's name, major program, Grade Point Average (GPA) obtained etc. Which will be signed by university authorities after the registration in central system and deployed in university. In order to verify the digital signature a person need to use a specific smart phone application which will scan and authenticate the certificate without gaining access to a user's security credentials such as password.

  • PDF

Experimental validation of the seismic analysis methodology for free-standing spent fuel racks

  • Merino, Alberto Gonzalez;Pena, Luis Costas de la;Gonzalez, Arturo
    • Nuclear Engineering and Technology
    • /
    • 제51권3호
    • /
    • pp.884-893
    • /
    • 2019
  • Spent fuel racks are steel structures used in the storage of the spent fuel removed from the nuclear power reactor. Rack units are submerged in the depths of the spent fuel pool to keep the fuel cool. Their free-standing design isolates their bases from the pool floor reducing structural stresses in case of seismic event. However, these singular features complicate their seismic analysis which involves a transient dynamic response with geometrical nonlinearities and fluid-structure interactions. An accurate estimation of the response is essential to achieve a safe pool layout and a reliable structural design. An analysis methodology based on the hydrodynamic mass concept and implicit integration algorithms was developed ad-hoc, but some dispersion of results still remains. In order to validate the analysis methodology, vibration tests are carried out on a reduced scale mock-up of a 2-rack system. The two rack mockups are submerged in free-standing conditions inside a rigid pool tank loaded with fake fuel assemblies and subjected to accelerations on a unidirectional shaking table. This article compares the experimental data with the numerical outputs of a finite element model built in ANSYS Mechanical. The in-phase motion of both units is highlighted and the water coupling effect is detailed. Results show a good agreement validating the methodology.

ETRI AI 실행전략 7: AI로 인한 기술·사회적 역기능 방지 (ETRI AI Strategy #7: Preventing Technological and Social Dysfunction Caused by AI)

  • 김태완;최새솔;연승준
    • 전자통신동향분석
    • /
    • 제35권7호
    • /
    • pp.67-76
    • /
    • 2020
  • Because of the development and spread of artificial intelligence (AI) technology, new security threats and adverse AI functions have emerged as a real problem in the process of diversifying areas of use and introducing AI-based products and services to users. In response, it is necessary to develop new AI-based technologies in the field of information protection and security. This paper reviews topics such as domestic and international trends on false information detection technology, cyber security technology, and trust distribution platform technology, and it establishes the direction of the promotion of technology development. In addition, the development of international trends in ethical AI guidelines to ensure the human-centered ethical validity of AI development processes and final systems in parallel with technology development are analyzed and discussed. ETRI has developed AI policing technology, information protection, and security technologies as well as derived tasks and implementation strategies to prepare ethical AI development guidelines to ensure the reliability of AI based on its capabilities.

Study on Real-time Cooperation Protect System Against Hacking Attacks of WiBro Service

  • Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • 제9권4호
    • /
    • pp.353-357
    • /
    • 2011
  • U.S. Obama government is submit a motion to consider cyber attacks on State as a war. 7.7DDoS attack in Korea in 2009 and 3.4 DDoS attacks 2011, the country can be considered about cyber attacks. China hackers access a third country, bypassing South Korea IP by hacking the e-commerce sites with fake account, that incident was damaging finance. In this paper, for WiBro service, DDoS attacks, hackers, security incidents and vulnerabilities to the analysis. From hacker's attack, WiBro service's prognostic relevance by analyzing symptoms and attacks, in real time, Divide Red, Orange, Yellow, Green belonging to the risk rating. For hackers to create a blacklist, to defend against attacks in real-time air-conditioning system is the study of security. WiBro networks for incident tracking and detection after the packets through the national incident response should contribute to the development of technology.