• Title/Summary/Keyword: detecting deception

Search Result 7, Processing Time 0.02 seconds

A Study on the Model for Determining the Deceptive Status of Attackers using Markov Chain (Markov Chain을 이용한 기만환경 칩입 공격자의 기만 여부 예측 모델에 대한 연구)

  • Sunmo Yoo;Sungmo Wi;Jonghwa Han;Yonghyoun Kim;Jungsik Cho
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.37-45
    • /
    • 2023
  • Cyber deception technology plays a crucial role in monitoring attacker activities and detecting new types of attacks. However, along with the advancements in deception technology, the development of Anti-honeypot technology has allowed attackers who recognize the deceptive environment to either cease their activities or exploit the environment in reverse. Currently, deception technology is unable to identify or respond to such situations. In this study, we propose a predictive model using Markov chain analysis to determine the identification of attackers who infiltrate deceptive environments. The proposed model for deception status determination is the first attempt of its kind and is expected to overcome the limitations of existing deception-based attacker analysis, which does not consider attackers who identify the deceptive environment. The classification model proposed in this study demonstrated a high accuracy rate of 97.5% in identifying and categorizing attackers operating in deceptive environments. By predicting the identification of an attacker's deceptive environment, it is anticipated that this model can provide refined data for numerous studies analyzing deceptive environment intrusions.

Detecting Deception Using Neuroscience : A Review on Lie Detection Using Functional Magnetic Resonance Imaging (거짓 탐지와 뇌과학 : 기능적 자기공명영상을 활용한 거짓 탐지)

  • Choi, Yera;Kim, Sangjoon;Do, Hyein;Shin, Kyung-Shik;Kim, Jieun E.
    • Korean Journal of Biological Psychiatry
    • /
    • v.22 no.3
    • /
    • pp.109-112
    • /
    • 2015
  • Since the early 2000s, there has been a continued interest in lie detection using functional magnetic resonance imaging (fMRI) in neuroscience and forensic sciences, as well as in newly emerging fields including neuroethics and neurolaw. Related fMRI studies have revealed converging evidence that brain regions including the prefrontal cortex, anterior cingulate cortex, parietal cortex, and anterior insula are associated with deceptive behavior. However, fMRI-based lie detection has thus far not been generally accepted as evidence in court, as methodological shortcomings, generalizability issues, and ethical and legal concerns are yet to be resolved. In the present review, we aim to illustrate these achievements and limitations of fMRI-based lie detection.

Anti-Drone Algorithm using GPS Sniffing (GPS 스니핑을 이용한 안티 드론 알고리즘)

  • Seo, Jin-Beom;Jo, Han-Bi;Song, Young-Hwan;Cho, Young-bok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.63-66
    • /
    • 2019
  • Recently, as the technology of drones develops, a malicious attack using a drones becomes a problem, and an anti-drone technology for detecting an attack dron for a malicious attack is required. However, currently used drone detection systems are expensive and require a lot of manpower. Therefore, in this paper, we propose an anti - drone method using the analysis and algorithms of the anti - drone that can monitor the attack drones. In this paper, we identify and detect attack drones using sniffing, and propose capture and deception algorithm through spoofing using current GPS based detection system.

  • PDF

Detecting lies through suspect's nonverbal behaviors in the investigation scene (군 수사현장에서 용의자의 비언어적 행동을 이용한 거짓말 탐지)

  • Si Up Kim;Woo Byoung Jhon;Chung Hyun Jeon
    • Korean Journal of Culture and Social Issue
    • /
    • v.12 no.2
    • /
    • pp.101-114
    • /
    • 2006
  • This study was examined the effective nonverbal behavior cues of detecting suspects' lies in the investigation scene. In order to search the suspects who drank the alcohol liquor without a permission, 18 soldiers were interviewed. 8 solders had drunken alcohol and had lied when was asked(lie group). The other 10 soldiers hadn't drunken alcohol and had told the truth(truth group). The mean frequencies of nonverbal behaviors were compared lie group with truth group. The following behaviors were measured by frequency: vocal characteristics (high pitch of voice, speech hesitations, speech error, frequency of pauses, period of pauses, latency period), facial characteristics (gaze, smile, touching face, blinking, facial micro-expression), body movement (illustrators, hand and finger movement, leg and foot movement, head movement, trunk movement, shifting position). As results, this study found that deception cues were periods and frequencies of pause, micro-expression, head movements. The lie group had less periods and frequencies of pause, and more micro-expression, head movements than truth group. But, this study didn't found Othello's error cues.

Detecting a deceptive attitude in non-pressure situations using K-LIWC (K-LIWC를 이용한 비압박 상황의 거짓 태도 탐지)

  • Kim, Young-il;Kim, Youngjun;Kim, Kyungil
    • Korean Journal of Cognitive Science
    • /
    • v.27 no.2
    • /
    • pp.247-273
    • /
    • 2016
  • Previous studies about lying were mainly executed in pressure situations, such as interviews or crime statements, which made people stressed. This study analyzed deceptive and non-deceptive writings in non-pressure situation through K-LIWC program, in which lies are rarely disclosed and hardly damage the liar even upon disclosure, Also, we compared these results with existing studies on lying. On both writing tasks, there were fewer first-person singular pronouns in deceptive writings than in the non-deceptive writings. The variables indicating cognitive complexity were less used by deceptive writings than by non-deceptive writings in first topic, but in the second topic, more were used by deceptive writings than true writings. In particular, previous studies claim that lies contain more negative emotional words while this report shows that lies in non-pressure situations contains more positive and fewer negative emotional words compared to truth. This finding implies that a situation influences the liar's psychological statement, which changes the contents of the lie.

The effects of asking unexpected questions on general details and verifiable details (예상치 못한 질문이 진술의 세부정보와 확인 가능한 사실의 양에 미치는 영향)

  • Moon, Hyemin;Jo, Eunkyung
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.3
    • /
    • pp.349-370
    • /
    • 2020
  • This study was to test the effects of unanticipated questions on the number of general and verifiable details. In addition, the number of verifiable details would discriminate truth-tellers and liars more accurately than the number of general details. In a 2(Veracity: truth vs. lie) X 2(Question type: Expected questions vs. Unexpected questions) mixed-design study, truth tellers(N=40) were asked to visit a cafe on campus and liars(N=40) were told to fabricated a story as if they visited the cafe. Then, participants were interviewed about their trip to the cafe and asked four questions(two anticipated questions: 'report the trip in detail', 'describe the place'; two unanticipated questions: 'recall in reverse order', 'report verifiable details'). Each participant's statements were transcribed and coded by trained graduate students for the number of general details and verifiable details. The results showed that truth-tellers mentioned significantly more general details than liars regardless of the question type. On the contrary, there was no significant difference between liars and truth-tellers in the number of verifiable details. High percentages of truth-tellers(62.5%) and liars(80.0%) were classified correctly based on the number of general details whereas only 45.0% of truth tellers and 62.5% of liars were accurately classified by the number of verifiable details. Liars were found to speak more words when asked to provide verifiable details compared to a general open question, but the number of general details did not seem to increase accordingly. The limitations of this study and future research directions were discussed.

  • PDF

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF