• Title/Summary/Keyword: deception

Search Result 111, Processing Time 0.029 seconds

A Study on Reinforcement Learning Method for the Deception Behavior : Focusing on Marine Corps Amphibious Demonstrations (강화학습을 활용한 기만행위 모의방법 연구 : 해병대 상륙양동 사례를 중심으로)

  • Park, Daekuk;Cho, Namsuk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.390-400
    • /
    • 2022
  • Military deception is an action executed to deliberately mislead enemy's decision by deceiving friendly forces intention. In the lessons learned from war history, deception appears to be a critical factor in the battlefield for successful operations. As training using war-game simulation is growing more important, it is become necessary to implement military deception in war-game model. However, there is no logics or rules proven to be effective for CGF(Computer Generated Forces) to conduct deception behavior automatically. In this study, we investigate methodologies for CGF to learn and conduct military deception using Reinforcement Learning. The key idea of the research is to define a new criterion called a "deception index" which defines how agent learn the action of deception considering both their own combat objectives and deception objectives. We choose Korea Marine Corps Amphibious Demonstrations to show applicability of our methods. The study has an unique contribution as the first research that describes method of implementing deception behavior.

Self-deception and Loneliness in "Adventure" (「모험」에 나타난 자기기만과 외로움)

  • Lee, Jong-moon
    • English & American cultural studies
    • /
    • v.18 no.4
    • /
    • pp.139-162
    • /
    • 2018
  • In "Adventure" Alice Hindman tries to express her repressed sexual instinct with impulsive adventures but becomes a grotesque through her own self-deception and extreme loneliness. She has a passionate relationship with Ned Currie at 16, which defines her identity and molds her entire life. She does believe that Ned may return and stick to his disingenuous word and promises, and holds on to it as the only and absolute truth in her life. Her distortion of reality is in fact based on her self-deception and falsehood she creates. Seized by a strange urge, her second adventure indicates that she wants to feel closer to another grotesque that can understand her loneliness, and that her desire for communication transcends her sexual desire. At the end of the story, she seems to realize that she will die in her bed alone, misunderstood and unloved. But this conclusion shows that, despite the opportunity and potential of another choice, she never makes positive choices and refuses to accept responsibility for her actions. She rather creates an excuse with empty words and shows the limits so as not to get out of her own self-deception. Instead of focusing on Alice's strange behavior and blaming her, Anderson emphasizes the importance of understanding and communication while exploring the sorrow and loneliness of a woman who wants to be loved but is obsessed with self-deception in Winesburg.

A Study on the Model for Determining the Deceptive Status of Attackers using Markov Chain (Markov Chain을 이용한 기만환경 칩입 공격자의 기만 여부 예측 모델에 대한 연구)

  • Sunmo Yoo;Sungmo Wi;Jonghwa Han;Yonghyoun Kim;Jungsik Cho
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.37-45
    • /
    • 2023
  • Cyber deception technology plays a crucial role in monitoring attacker activities and detecting new types of attacks. However, along with the advancements in deception technology, the development of Anti-honeypot technology has allowed attackers who recognize the deceptive environment to either cease their activities or exploit the environment in reverse. Currently, deception technology is unable to identify or respond to such situations. In this study, we propose a predictive model using Markov chain analysis to determine the identification of attackers who infiltrate deceptive environments. The proposed model for deception status determination is the first attempt of its kind and is expected to overcome the limitations of existing deception-based attacker analysis, which does not consider attackers who identify the deceptive environment. The classification model proposed in this study demonstrated a high accuracy rate of 97.5% in identifying and categorizing attackers operating in deceptive environments. By predicting the identification of an attacker's deceptive environment, it is anticipated that this model can provide refined data for numerous studies analyzing deceptive environment intrusions.

Subjective Indicators of Deception Detection in High/Low Stake Situations: Comparison among University Students and Prison Officers and Prisoners (이해득실 상황에 따른 거짓말 탐지에 대한 주관적 지표 - 대학생, 교도관, 재소자들을 대상으로 -)

  • Woo Byoung Jhon;Si Up Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.11 no.4
    • /
    • pp.1-22
    • /
    • 2005
  • Purposes of this study was as following; What differences do subjective indicators of deception detection according to high and low stake situations? Does groups difference appear in beliefs about deception cues? Is what differences between objective indicators and subjective indicators of deceptions? Participants of this study were consisted of university students, prison officers, prisoners. They completed a questionnaire concerning beliefs about 21 verbal and nonverbal behaviours in high/low-stake situations. For each behaviour, they were asked to rate on a seven-point scale how are these behaviours changed comparing to normal times. The results were that subjective indicators of deception were no differences between high-stake and low-stake situations, and no differences among groups. Also, it appeared that the subjective indicators of deception were substantly different from the objective indicators of deception.

Deception Performance Analysis of Cross Eye Technique against Conical Scan Radar (크로스 아이 기법의 원추형 스캔 레이더 기만 성능 분석)

  • Jang, Yeonsoo;Park, Jintae;Cho, Jihaeng;Lee, Changhoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.5
    • /
    • pp.583-590
    • /
    • 2018
  • Cross eye technique was proposed as an angle deception jamming technique against monopulse radars. Tracking radars use monopulse or conical scan methods for angle estimation of a target. Thus, if we verify deception performance of cross eye technique against a conical scan radar, efficient jamming systems can be developed to disturb both monopulse radars and conical scan radars. In this paper, we propose a mathematical model for a conical scan radar and a cross eye system. Using the proposed model, angular deception performance of the cross eye technique against conical scan radar is analyzed.

The Effect of Deceptive Brand Image on Consumer Purchase Intention: Empirical Evidence from Iraqi Market

  • ALQAYSI, Sahar Jalal;ZAHARI, Abdul Rahman
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.6
    • /
    • pp.207-217
    • /
    • 2022
  • In recent years, the Iraqi market witnessed a large opening that resulted from the entry of many different products with an absence of government regulations. As a result, marketing deception practices have emerged as a new phenomenon. This study examines the effect of deceptive brand image on consumer purchase intention, with consumer attitude as a mediator. A quantitative method was applied in the form of a questionnaire distributed to shoppers at Carrefour Supermarket in Erbil, Kurdistan Region of Iraq. A random sampling technique was conducted. Subsequently, 200 questionnaires were distributed, and 175 valid questionnaires were analyzed, indicating an 87% response rate. Partial least squares structural equation modelling (PLS-SEM) has been utilized to test the hypothesis. The result showed that brand image deception has a negative impact on consumer purchasing intention. Also, attitude mediates the relationship between deceptive brand image and consumer purchase intention. The empirical finding confirms that deceptive marketing practices such as brand deception can change the attitude of consumers negatively toward brands and, therefore, affect the consumer purchase intentions. The findings suggest that honest brand marketing is beneficial in increasing the attitude toward the brand. This strategy will increase consumer purchase intentions.

Development of Tracking Technique against FMCW Proximity Fuze (FMCW방식 근접신관 신호 추적 기법 개발)

  • Hong, Sang-Geun;Choi, Song-Suk;Shin, Dong-Cho;Lim, Jae-Moon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.910-916
    • /
    • 2010
  • A modern artillery use a FMCW Proximity Fuze for effectively target destruction. FMCW Proximity Fuze can be deceived by Jamming Technique because it uses RF for distance estimation. FMCW Proximity Fuze algorithm is similar to FMCW radar's, but normal Jamming Tech. like Noise and Mulitone is useless. Most Shots with FMCW Proximity Fuze have a additional mechanical fuze against RF Jamming. Shots explode by mechanical fuze when Proximity Fuse is Jammed. However, distance Deception is available because shots can not distinguish between deception jamming signal and ground reflected signal. For making Distance Deception Jamming, FMCW signal tracking is demanded. In this paper, we propose a FMCW tracking method and develop the Jammer to show Jamming signal.

Analysis of Deception Jamming Effects on FM Radio based Passive Radar (FM 라디오 기반 수동형 레이다 기만재밍 효과 분석)

  • Song, Kyuha;Kwak, Hyungyu;Kim, Sanhae;Jeong, Inhwan;Lee, Jonghwan;Lee, Byeongnam
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.3
    • /
    • pp.239-250
    • /
    • 2022
  • In this paper, we analyze the performance of an FM radio based passive radar in the presence of deception jamming such as false-target generation. To do this, we examine the effects of applying the deception jamming signal to the passive radar through the derivation of the construction of the amplitude-range-Doppler(ARD) plot. The analysis results show that applying the deception jamming signal with the low power similar to the target echo signal generates false targets at positions set by the jamming variables compared to the real target position in the ARD plot. Also, it is possible to induce the jamming effect so that only false targets are detected by selecting appropriate jamming power. Simulations are included to verify the theoretical results and to discuss on the effectiveness of the deception jamming on the FM radio based passive radar.

Implementation of VGPO/VGPI Velocity Deception Jamming Technique using Phase Sampled DRFM (위상 샘플방식 DRFM을 이용한 VGPO/VGPI 속도기만 재밍기법 구현)

  • Kim, Yo-Han;Moon, Byung-Jin;Hong, Sang-Guen;Sung, Ki-Min;Jeon, Young-Il;Na, In-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.955-961
    • /
    • 2021
  • In modern warfare, the importance of electronic warfare, which carries out a mission that using radio wave to find out enemy information or to protect ally information, has increased. Radar jamming technique is one of the most representative techniques of EA(Electronic Attack), it disturbs and deceives enemy radar system in order to secure ally location information. Velocity deception jamming technique, which is one of the radar jamming techniques, generally operate against pulse-doppler radar which use doppler effect in order to track target's velocity and location. Velocity Deception Jamming Technique can be implemented using DRFM(Digital Radio Frequency Memory) that performs Frequency Modulation. In this paper, I describe implementation method of VGPO/VGPI(Velocity Gate Pull-Off/Pull-In) velocity deception jamming technique using phase-sampled DRFM, and verify the operation of VGPO/VGPI velocity deception jamming technique with board test under signal injection condition.

EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception

  • Li, Huanruo;Guo, Yunfei;Huo, Shumin;Ding, Yuehang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1891-1908
    • /
    • 2021
  • Cyber deception defense mitigates Advanced Persistent Threats (APTs) with deploying deceptive entities, such as the Honeyfile. The Honeyfile distracts attackers from valuable digital documents and attracts unauthorized access by deliberately exposing fake content. The effectiveness of distraction and trap lies in the enticement of fake content. However, existing studies on the Honeyfile focus less on this perspective. In this work, we seek to improve the enticement of fake text content through enhancing its readability, indistinguishability, and believability. Hence, an enticing deceptive-content generator, EDGE, is presented. The EDGE is constructed with three steps: extracting key concepts with a semantics-aware K-means clustering algorithm, searching for candidate deceptive concepts within the Word2Vec model, and generating deceptive text content under the Integrated Readability Index (IR). Furthermore, the readability and believability performance analyses are undertaken. The experimental results show that EDGE generates indistinguishable deceptive text content without decreasing readability. In all, EDGE proves effective to generate enticing deceptive text content as deception defense against APTs.