• Title/Summary/Keyword: deception

Search Result 116, Processing Time 0.028 seconds

Enhancing the Reliability of Wi-Fi Network Using Evil Twin AP Detection Method Based on Machine Learning

  • Seo, Jeonghoon;Cho, Chaeho;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.541-556
    • /
    • 2020
  • Wireless networks have become integral to society as they provide mobility and scalability advantages. However, their disadvantage is that they cannot control the media, which makes them vulnerable to various types of attacks. One example of such attacks is the evil twin access point (AP) attack, in which an authorized AP is impersonated by mimicking its service set identifier (SSID) and media access control (MAC) address. Evil twin APs are a major source of deception in wireless networks, facilitating message forgery and eavesdropping. Hence, it is necessary to detect them rapidly. To this end, numerous methods using clock skew have been proposed for evil twin AP detection. However, clock skew is difficult to calculate precisely because wireless networks are vulnerable to noise. This paper proposes an evil twin AP detection method that uses a multiple-feature-based machine learning classification algorithm. The features used in the proposed method are clock skew, channel, received signal strength, and duration. The results of experiments conducted indicate that the proposed method has an evil twin AP detection accuracy of 100% using the random forest algorithm.

John Irving's Heroes and Their Graces

  • Kim, Ilgu
    • English & American cultural studies
    • /
    • v.9 no.1
    • /
    • pp.91-112
    • /
    • 2009
  • Referring to John Irving's 2001 published fiction The Fourth Hand, the publisher commented, "It seems, at first, to be a comedy, perhaps a satire, almost certainly a sexual farce. Yet, in the end, it is as realistic and emotionally moving as any of Mr. Irving's previous novels." In his early six novels, John Irving shows the world suffused with grief and deception. But his novels finally turn out also as a comic and robust novel. The writer's success in achieving this thick description of the contradictory modern world is largely due to his development of the idea of the flawed hero. Despite loss, sadness and abandonment, Irving's heroes maintain classical heroic traits such as intelligence, tenderness, protectiveness, strength, bravery, sense of humor, independence, attractiveness. In this article, I tried to emphasize these graces potent in Irving's heroes as the most attractive and influential device for the writer's consistent popularity among the general public. The cinematization of his four fictions attest to audience's sympathy toward rewarding vulnerability and truthful exaggeration in the depiction of Irving's heroes. By taking full responsibility for their own fate despite having the flaws, Irving's protagonists still appeal to many readers as heroes resilient in a modern chaotic world without losing their graces.

Anti-Drone Algorithm using GPS Sniffing (GPS 스니핑을 이용한 안티 드론 알고리즘)

  • Seo, Jin-Beom;Jo, Han-Bi;Song, Young-Hwan;Cho, Young-bok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.63-66
    • /
    • 2019
  • Recently, as the technology of drones develops, a malicious attack using a drones becomes a problem, and an anti-drone technology for detecting an attack dron for a malicious attack is required. However, currently used drone detection systems are expensive and require a lot of manpower. Therefore, in this paper, we propose an anti - drone method using the analysis and algorithms of the anti - drone that can monitor the attack drones. In this paper, we identify and detect attack drones using sniffing, and propose capture and deception algorithm through spoofing using current GPS based detection system.

  • PDF

Analysis of Range Measurement Based on MF DGNSS Infrastructures

  • Son, Pyo-Woong;Han, Younghoon;Seo, Kiyeol;Fang, Tae Hyun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.4
    • /
    • pp.245-250
    • /
    • 2022
  • As location-based services using the Global Navigation Satellite System (GNSS) are diversified, concerns about the vulnerability of GNSS to radio disturbance and deception are also growing. Accordingly, countries that own and operate GNSS, such as the United States, Russia, and Europe, are also developing additional navigation systems that can compensate for GNSS' weaknesses. Among them, an R-Mode system that transmits navigation signals using an infrastructure that transmits differential GNSS (DGNSS) information using signals from the medium frequency band currently in operation is being developed in Europe and Korea. Since 2020, Korea has improved four DGNSS transmission stations, including Chungju, Eocheongdo, Palmido, and Socheongdo, to transmit R-Mode signals and test navigation performance in some parts of the West Sea. In this paper, we intend to establish a testbed for measuring the distance of R-Mode signals currently being transmitted and analyze the results. It is confirmed that the distance measurement performance varies depending on the antenna type, diurnal variation, and propagation path of the signal.

"To Invent the Truth": Ford Madox Ford's Life and His Literary Impression ("진실의 창안": 포드 매독스 포드의 삶과 문학적 인상주의)

  • Kim, Heesun
    • English & American cultural studies
    • /
    • v.14 no.2
    • /
    • pp.127-157
    • /
    • 2014
  • Among many literary isms, impressionism is often regarded as the most frank expression of personality. As a masterpiece of modernism, Ford Madox Ford's The Good Soldier is a celebration of the subjectivity which reflects the writer's experiential reality. For Madox Ford, art is not to achieve the true objectivity of human society, but to seize the momentary perception in personal life. As the beginning of modernism, Madox Ford's impressionaism was mostly devoted to give fictive life to subjective impressions. And his heroes are usually the egoless person who can absorb the intense rapidity of consciousness without any prejudice. However, the innocent mind's receptions of myriad impressions, like those of the protagonist John Dowell or his idealized version of Major Ashburnham in The Good Solidier, were described as the enjoyable yet deceptive ones in Madox Ford's works. To engrave more sold perceptive impressions into life, Madox Ford often contrasts or mixes truth with deception, life with death as he did in his real life. Speicially as the result of thick application of real-life subject matters to his writings, Madox Ford's literary works get more vivid colors and penetrating forms. Thus, his literary impressionism based upon his harsh and passionate realities overcomes the limitations of shifting moments of senses, demolishing the boundaries between what is objective and what is subjective, like post-impressionism or expressionism. Namely, as Walter Lowenfels said, Madox Ford did not follow the impossible objectivity passively, yet instead "knew how to invent the truth."

Introducing Daesoon Philosophy to the West

  • BAKER, Don
    • Journal of Daesoon Thought and the Religions of East Asia
    • /
    • v.2 no.1
    • /
    • pp.13-29
    • /
    • 2022
  • Daesoon philosophy has been described as a quintessential Korean philosophy. Given the great difference between traditional Western and East Asian ways of thinking, how can such a quintessential Korean philosophy be explained to people who have no background in traditional East Asian thought? After all, the Daeson Jinrihoe way of approaching such core problems as how to make this world a better place is not only very different from the way the West has traditionally approached such problems, Daesoon Jinrihoe uses terminology which most Westerners are not very familiar with. Translation into Western languages such as English helps, but a conceptual gap remains because of the differences in the way key Daesoon Jinrihoe terms are understood in the West. As a first step toward overcoming that gap, I discuss three key teachings of Daesoon philosophy and how their translations into English need to be amplified so that people in the West who are not well versed in East Asian philosophy can gain a more accurate understanding of what those terms and phrases mean in their original language. The three items discussed here are the tenet "virtuous concordance of yin and yang," the Essential Attitude of sincerity, and the precept "do not deceive yourself."

Trusted and Transparent Blockchain-based Land Registration System

  • Fatmah Bayounis;Sana Dehlavi;Asmaa Azimudin;Taif Alghamdi;Aymen Akremi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.214-224
    • /
    • 2023
  • Fraudulence, cheating, and deception can occur in the commercial real estate (CRE) industry, besides the difficulty in searching for and transferring properties while ensuring the operation is processed through an authoritative source in a trusted manner. Nowadays, real estate transactions use neutral third parties to sell land. Indeed, properties can be sold by the owners or third parties multiple times or without a proper deed. Moreover, third parties request a large amount of money to mediate between the seller and buyer. Methods: We propose a new framework that uses a private blockchain network and predefined BPMN instances to enable the fast and easy recording of deeds and their proprietary transfer management controlled by the government. The blockchain allows for multiple verifications of transactions by permitted parties called peers. It promotes transparency, privacy, trust, and commercial competition. Results: We demonstrated the easy adoption of blockchain for land registration and transfer. The paper presents a prototype of the implemented product that follows the proposed framework. Conclusion: The use of Blockchain-based solutions to resolve the current land registration and transfer issues is promising and will contribute to smart cities and digital governance.

A Simulator Development of Surface Warship Torpedo Defense System considering Bubble-Generating Wake Decoy (기포발생식 항적기만기를 고려한 수상함 어뢰방어체계 시뮬레이터 개발)

  • Wooshik Kim;Myoungin Shin;Jisung Park;Ho Seuk Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.3
    • /
    • pp.416-427
    • /
    • 2024
  • The wake-homing underwater guided weapon that detects and tracks wake generated during voyage of a surface ship is impossible to avoid with the present acoustic deception torpedo defense system. Therefore, research on bubble-generating wake decoy is necessary to deceive wake-homing underwater guided weapon. Experiments in various environments are required to verify the effective operation method and performance of the wake decoy, but performance verification through underwater experiment is limited. In this paper, we develop a simulator for an torpedo defense system of surface ship, which is applied bubble-generating wake decoy, against acoustic, wake, and hybrid homing underwater guided weapon attack. The simulator includes surface ship model, acoustic decoy(static, mobile) model, bubble-generating wake decoy model, search and motion model of underwater guided weapon and so on. By integrating various models, MATLAB GUI simulator was developed. Through the simulation results for various environmental variables by this simulator, it is judged that effective operation method and performance verification of the bubble-generating wake decoy can be performed.

Building On/off Attacks Detector for Effective Trust Evaluation in Cloud Services Environment

  • SALAH T. ALSHAMMARI;AIIAD ALBESHRI;KHALID ALSUBHI
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.101-107
    • /
    • 2024
  • Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is quite versatile, which is why extensive amounts of data can be stored in the cloud. Furthermore, businesses can access various services over the cloud without having to install applications. However, the cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Though there are several advantages of cloud computing services, especially to business owners, various challenges are also posed in terms of the privacy and security of information and online services. A kind of threat that is widely faced in the cloud environment is the on/off attack. In this kind of attack, a few entities exhibit proper behavior for a given time period to develop a highly a positive reputation and gather trust, after which they exhibit deception. A viable solution is provided by the given trust model for preventing the attacks. This method works by providing effective security to the cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on-off attacks.

Study On Identifying Cyber Attack Classification Through The Analysis of Cyber Attack Intention (사이버공격 의도분석을 통한 공격유형 분류에 관한 연구 - 사이버공격의 정치·경제적 피해분석을 중심으로 -)

  • Park, Sang-min;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.103-113
    • /
    • 2017
  • Cyber attacks can be classified by type of cyber war, terrorism and crime etc., depending on the purpose and intent. Those are mobilized the various means and tactics which are like hacking, DDoS, propaganda. The damage caused by cyber attacks can be calculated by a variety of categories. We may identify cyber attackers to pursue trace-back based facts including digital forensics etc. However, recent cyber attacks are trying to induce confusion and deception through the manipulation of digital information or even conceal the attack. Therefore, we need to do the harm-based analysis. In this paper, we analyze the damage caused during cyber attacks from economic and political point of view and by inferring the attack intent could classify types of cyber attacks.