• Title/Summary/Keyword: deception technology

Search Result 33, Processing Time 0.025 seconds

A Study on Reinforcement Learning Method for the Deception Behavior : Focusing on Marine Corps Amphibious Demonstrations (강화학습을 활용한 기만행위 모의방법 연구 : 해병대 상륙양동 사례를 중심으로)

  • Park, Daekuk;Cho, Namsuk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.390-400
    • /
    • 2022
  • Military deception is an action executed to deliberately mislead enemy's decision by deceiving friendly forces intention. In the lessons learned from war history, deception appears to be a critical factor in the battlefield for successful operations. As training using war-game simulation is growing more important, it is become necessary to implement military deception in war-game model. However, there is no logics or rules proven to be effective for CGF(Computer Generated Forces) to conduct deception behavior automatically. In this study, we investigate methodologies for CGF to learn and conduct military deception using Reinforcement Learning. The key idea of the research is to define a new criterion called a "deception index" which defines how agent learn the action of deception considering both their own combat objectives and deception objectives. We choose Korea Marine Corps Amphibious Demonstrations to show applicability of our methods. The study has an unique contribution as the first research that describes method of implementing deception behavior.

A Study on the Model for Determining the Deceptive Status of Attackers using Markov Chain (Markov Chain을 이용한 기만환경 칩입 공격자의 기만 여부 예측 모델에 대한 연구)

  • Sunmo Yoo;Sungmo Wi;Jonghwa Han;Yonghyoun Kim;Jungsik Cho
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.37-45
    • /
    • 2023
  • Cyber deception technology plays a crucial role in monitoring attacker activities and detecting new types of attacks. However, along with the advancements in deception technology, the development of Anti-honeypot technology has allowed attackers who recognize the deceptive environment to either cease their activities or exploit the environment in reverse. Currently, deception technology is unable to identify or respond to such situations. In this study, we propose a predictive model using Markov chain analysis to determine the identification of attackers who infiltrate deceptive environments. The proposed model for deception status determination is the first attempt of its kind and is expected to overcome the limitations of existing deception-based attacker analysis, which does not consider attackers who identify the deceptive environment. The classification model proposed in this study demonstrated a high accuracy rate of 97.5% in identifying and categorizing attackers operating in deceptive environments. By predicting the identification of an attacker's deceptive environment, it is anticipated that this model can provide refined data for numerous studies analyzing deceptive environment intrusions.

Analysis of Deception Jamming Effects on FM Radio based Passive Radar (FM 라디오 기반 수동형 레이다 기만재밍 효과 분석)

  • Song, Kyuha;Kwak, Hyungyu;Kim, Sanhae;Jeong, Inhwan;Lee, Jonghwan;Lee, Byeongnam
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.3
    • /
    • pp.239-250
    • /
    • 2022
  • In this paper, we analyze the performance of an FM radio based passive radar in the presence of deception jamming such as false-target generation. To do this, we examine the effects of applying the deception jamming signal to the passive radar through the derivation of the construction of the amplitude-range-Doppler(ARD) plot. The analysis results show that applying the deception jamming signal with the low power similar to the target echo signal generates false targets at positions set by the jamming variables compared to the real target position in the ARD plot. Also, it is possible to induce the jamming effect so that only false targets are detected by selecting appropriate jamming power. Simulations are included to verify the theoretical results and to discuss on the effectiveness of the deception jamming on the FM radio based passive radar.

Development of Tracking Technique against FMCW Proximity Fuze (FMCW방식 근접신관 신호 추적 기법 개발)

  • Hong, Sang-Geun;Choi, Song-Suk;Shin, Dong-Cho;Lim, Jae-Moon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.910-916
    • /
    • 2010
  • A modern artillery use a FMCW Proximity Fuze for effectively target destruction. FMCW Proximity Fuze can be deceived by Jamming Technique because it uses RF for distance estimation. FMCW Proximity Fuze algorithm is similar to FMCW radar's, but normal Jamming Tech. like Noise and Mulitone is useless. Most Shots with FMCW Proximity Fuze have a additional mechanical fuze against RF Jamming. Shots explode by mechanical fuze when Proximity Fuse is Jammed. However, distance Deception is available because shots can not distinguish between deception jamming signal and ground reflected signal. For making Distance Deception Jamming, FMCW signal tracking is demanded. In this paper, we propose a FMCW tracking method and develop the Jammer to show Jamming signal.

Deception Performance Analysis of Cross Eye Technique against Conical Scan Radar (크로스 아이 기법의 원추형 스캔 레이더 기만 성능 분석)

  • Jang, Yeonsoo;Park, Jintae;Cho, Jihaeng;Lee, Changhoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.5
    • /
    • pp.583-590
    • /
    • 2018
  • Cross eye technique was proposed as an angle deception jamming technique against monopulse radars. Tracking radars use monopulse or conical scan methods for angle estimation of a target. Thus, if we verify deception performance of cross eye technique against a conical scan radar, efficient jamming systems can be developed to disturb both monopulse radars and conical scan radars. In this paper, we propose a mathematical model for a conical scan radar and a cross eye system. Using the proposed model, angular deception performance of the cross eye technique against conical scan radar is analyzed.

Region Defense Technique Using Multiple Satellite Navigation Spoofing Signals

  • Lee, Chi-Hun;Choi, Seungho;Lee, Young-Joong;Lee, Sang Jeong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.3
    • /
    • pp.173-179
    • /
    • 2022
  • The satellite navigation deception technology disturbs the navigation solution of the receiver by generating a deceptive signal simulating the actual satellite for the satellite navigation receiver mounted on the unmanned aerial vehicle, which is the target of deception. A single spoofing technique that creates a single deceptive position and velocity can be divided into a synchronized spoofing signal that matches the code delay, Doppler frequency, and navigation message with the real satellite and an unsynchronized spoofing signal that does not match. In order to generate a signal synchronized with a satellite signal, a very sophisticated and high precision signal generation technology is required. In addition, the current position and speed of the UAV equipped with the receiver must be accurately detected in real time. Considering the detection accuracy of the current radar technology that detects small UAVs, it is difficult to detect UAVs with an accuracy of less than one chip. In this paper, we assume the asynchrony of a single spoofing signal and propose a region defense technique using multiple spoofing signals.

Cross Eye Technique with Single Transceiver (단일 송수신기 구조의 크로스 아이 기법)

  • Jang, Yeonsoo;Lee, Changhoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.5
    • /
    • pp.598-605
    • /
    • 2016
  • One of the effective methods for angular deception against monopulse radar is a cross eye technique. The typical cross eye technique can cause significant angular errors to monopulse radar by using two transceivers which transmit the signals with opposite phases. However, typical cross eye systems have high complexity of implementation because two transceivers should be installed with enough distance on the platform. In this paper, we propose a new cross eye technique with single transceiver based on the multipath effect. Then, angular deception performance of the proposed technique is analyzed.

Feasibility study of corner reflector for radar countermeasures and deception for conventional forces

  • Kang, Hee-Jin;Yang, Hyang-Kweon;Jo, Min-Chul;Kim, Kook-Hyun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.41 no.2
    • /
    • pp.171-175
    • /
    • 2017
  • The high-tech large warships are minimal and they are always monitored by opponents, and become primary targets when conflicts occur. The improvement in reducing susceptibility has significant importance because it is difficult for a ship to maintain mission capability and functionality once it is damaged. Ordinary decoys are effective only under the premise that the ship has already been exposed. Traditionally, for naval vessels, techniques related to the radar have been used in military stealth techniques to ensure confidentiality. The corner reflector, on the other hand, can produce rather large radar cross sections. Continued use of deceptive systems such as chaff during operations will help to improve survivability of naval ships. From this viewpoint, corner reflector was considered for making radar countermeasures and deception technology. This paper reviews the current status of corner reflector basis decoys and the technical feasibility of corner reflectors for developing structural decoys.

A Development of the DIRCM Effectiveness Analysis Simulator based on DEVS (DEVS 기반 DIRCM 효과도 분석 시뮬레이터 개발)

  • Shin, Baek-Cheon;Hur, Jang-Wook;Kim, Tag-Gon;Kim, Mi-Jeong
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.2
    • /
    • pp.115-123
    • /
    • 2018
  • we analyzed simulation of the effectiveness for one or two DIRCM on a helicopter. The survival rate of helicopter followed increase of the deception rate of DIRCM. When the deception rate was over 70% at 100% detection rate, the survival rate was 10~30% when one DIRCM was installed and the survival rate was 70~80% when two DIRCMs were installed. When the detection rate was over 70% at 100% deception rate the survival rate was 10~30% case of one DIRCM was installed. survival rate was 20~30% when two were installed. Survival rate of 70~90% was observed with one DIRCM when the deception rate and detection rate were 100%, and 100% with two DIRCMs.

A Study on Deception Ship for Ship Susceptibility Improvement based on System Engineering Approach (함정 피격성 향상을 위한 시스템엔지니어링 접근법 기반의 기만선박 개념 연구)

  • Kang, Hee-Jin;Shin, Jong-Gye;Lee, Dong-Kon;Choi, Jin
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.46 no.3
    • /
    • pp.313-314
    • /
    • 2009
  • To project military power, the paradigm of the modern warship aquisition has evolved with more large platform and high-technology equipment. For example, the Aegis combat system equipped warship is one of the most advanced and capable defense systems currently in use. Concurrently, if the warship attacked and disabled, it may worse the asymmetry of the battle field and it also depress the morale of the fleet. For that reason, to keep and protect few number of the big and high technology equipped warship from enemy is very important. At the present, the performance of unit weapon has enhanced remarkably. A Korean-built SS-209 class submarine, Lee Chun-ham, participated in Naval Exercise Tandem Thrust conducted in 1999, sink the target ship ex-USS Oklahoma by a single torpedo. USS Stark was struck on May 17, 1987, by two Exocet anti ship missiles and disabled. For this reason, susceptibility should be prior to vulnerability and recoverability. In this paper, deception ship which is small and chief but has very similar signatures to large and high technology equiped warship has conceptually studied by using systems engineering approach. And it may be a effective way to enhance the susceptibility of the key fighting power.