Devising a procedure to determine the level of informational space security in social networks considering interrelations among users

Authors

DOI:

https://doi.org/10.15587/1729-4061.2022.252135

Keywords:

social network, users’ relationships, security system, nonlinearity, differential equations, procedure

Abstract

Linear and dynamic models of the system of information security in social networks, taking into consideration the relationships between users, were studied and the resistance of the security system was analyzed.

There is a practical interest in studying dependence of the behavior of the system of social network security on the parameters of users’ interaction. Dynamic systems of information security in social networks in the mathematical sense of this term were considered. A dynamic system refers to any object or process, for which the concept of state as a totality of certain magnitudes at a given time is unambiguously defined and the law that describes a change (evolution) of the initial state over time was assigned.

The network of social interactions consists of a totality of social users and a totality of the relations between them. Individuals, social groups, organizations, cities, countries can act as users. Relations imply not only communication interactions between users but also relations of the exchange of various resources and activities, including conflict relations.

As a result of research, it was found that the security systems of a social network are nonlinear. Theoretical study of the dynamic behavior of an actual object requires the creation of its mathematical model. The procedure for developing a model is to compile mathematical equations based on physical laws. These laws are stated in the language of differential equations.

Phase portraits of the data security system in the MATLAB/Multisim program, which indicate the stability of a security system in the working range of parameters even at the maximum value of the impacts, were determined.

Thus, the influence of users’ interaction parameters on the parameters of the system of social network security was explored. Such study is useful and important in terms of information security in the network, since the parameters of users’ interaction significantly affect, up to 100 %, the security indicator.

Author Biographies

Volodymyr Akhramovych, State University of Telecommunications

Doctor of Technical Sciences, Senior Researcher, Professor

Department of Information and Cyber Defense Systems

German Shuklin, State University of Telecommunications

PhD, Associate Professor, Head of Department

Department of Information and Cyber Defense Systems

Yuriy Pepa, State University of Telecommunications

PhD, Associate Professor

Department of Information and Cyber Defense Systems

Tetiana Muzhanova, State University of Telecommunications

PhD, Associate Professor

Department of Information and Cyber Security Management

Serhii Zozulia, State University of Telecommunications

Postgraduate Student

Department of Information and Cyber Defense Systems

References

  1. Newcomb, T. M. (1953). An approach to the study of communicative acts. Psychological Review, 60 (6), 393–404. doi: https://doi.org/10.1037/h0063098
  2. Cartwright, D., Harary, F. (1956). Structural balance: a generalization of Heider's theory. Psychological Review, 63 (5), 277–293. doi: https://doi.org/10.1037/h0046049
  3. Glaser, W. A. (1959). Job Mobility between Government and other Social Structures. Political Research, Organization and Design, 3 (3), 20–23. doi: https://doi.org/10.1177/000276425900300307
  4. Bavelas, A. (1950). Communication Patterns in Task‐Oriented Groups. The Journal of the Acoustical Society of America, 22 (6), 725–730. doi: https://doi.org/10.1121/1.1906679
  5. Festinger, L. (1954). A Theory of Social Comparison Processes. Human Relations, 7 (2), 117–140. doi: https://doi.org/10.1177/001872675400700202
  6. Radcliffe-Brown, A. R. (1935). On the Concept of Function in Social Science. American Anthropologist, 37 (3), 394–402. doi: https://doi.org/10.1525/aa.1935.37.3.02a00030
  7. Heider, F. (1946). Attitudes and Cognitive Organization. The Journal of Psychology, 21 (1), 107–112. doi: https://doi.org/10.1080/00223980.1946.9917275
  8. Berkman, L. (2020). The Intelligent Control System for infocommunication networks. International Journal of Emerging Trends in Engineering Research, 8 (5), 1920–1925. doi: https://doi.org/10.30534/ijeter/2020/73852020
  9. Semenov, S., Weilin, C. (2020). Testing process for penetration into computer systems mathematical model modification. Advanced Information Systems, 4 (3), 133–138. doi: https://doi.org/10.20998/2522-9052.2020.3.19
  10. Semenov, S., Weilin, C., Zhang, L., Bulba, S. (2021). Automated penetration testing method using deep machine learning technology. Advanced Information Systems, 5 (3), 119–127. doi: https://doi.org/10.20998/2522-9052.2021.3.16
  11. Cherneva, G., Khalimov, P. (2021). Mutation testing of access control policies. Advanced Information Systems, 5 (1), 118–122. doi: https://doi.org/10.20998/2522-9052.2021.1.17
  12. Liqiang, Z., Weiling, C., Rabčan, J., Davydov, V., Miroshnichenko, N. (2021). Analysis and comparative studies of software penetration testing methods. Advanced Information Systems, 5 (2), 136–140. doi: https://doi.org/10.20998/2522-9052.2021.2.20
  13. Mashkov, V. A., Barabash, O. V. (1998). Self-checking and self-diagnosis of module systems on the principle of walking diagnostic kernel. Engineering Simulation. Amsterdam: OPA, 15 (1), 43–51.
  14. Radkevych, O. P. (2012). Konfidentsiynist personalnoi informatsiyi v sotsialnykh merezhakh. Visnyk Vyshchoi rady yustytsiyi, 3 (11), 215–224.
  15. Laptiev, O., Shuklin, G., Savchenko, V., Barabash, O., Musienko, A., Haidur, H. (2019). The Method of Hidden Transmitters Detection based on the Differential Transformation Model. International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE), 8 (6), 2840–2846. doi: https://doi.org/10.30534/ijatcse/2019/26862019
  16. Podobnik, V., Lovrek, I. (2015). Implicit Social Networking: Discovery of Hidden Relationships, Roles and Communities among Consumers. Procedia Computer Science, 60, 583–592. doi: https://doi.org/10.1016/j.procs.2015.08.185
  17. Farseev, A., Nie, L., Akbari, M., Chua, T.-S. (2015). Harvesting Multiple Sources for User Profile Learning. Proceedings of the 5th ACM on International Conference on Multimedia Retrieval. doi: https://doi.org/10.1145/2671188.2749381
  18. Chorley, M. J., Whitaker, R. M., Allen, S. M. (2015). Personality and location-based social networks. Computers in Human Behavior, 46, 45–56. doi: https://doi.org/10.1016/j.chb.2014.12.038
  19. Wilson, C., Sala, A., Puttaswamy, K. P. N., Zhao, B. Y. (2012). Beyond Social Graphs. ACM Transactions on the Web, 6 (4), 1–31. doi: https://doi.org/10.1145/2382616.2382620
  20. Souri, A., Nourozi, M., Rahmani, A. M., Jafari Navimipour, N. (2019). A model checking approach for user relationship management in the social network. Kybernetes, 48 (3), 407–423. doi: https://doi.org/10.1108/k-02-2018-0092
  21. Grevtsov, V. E. (2010). Razvitie sotsial'nyh svyazey i otnosheniy v virtual'nyh soobschestvah. Sotsiosfera, 1, 59–61.
  22. Kaltenbrunner, A., Scellato, S., Volkovich, Y., Laniado, D., Currie, D., Jutemar, E. J., Mascolo, C. (2012). Far from the eyes, close on the web. Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks - WOSN ’12. doi: https://doi.org/10.1145/2342549.2342555
  23. Akhramovych V. M. (2019). Model of Mutual Relationship of Users in Social Networks. Modern Information Security, 3, 42–50. doi: https://doi.org/10.31673/2409-7292.2019.034250
  24. Asim, Y., Malik, A. K., Raza, B., Shahid, A. R. (2019). A trust model for analysis of trust, influence and their relationship in social network communities. Telematics and Informatics, 36, 94–116. doi: https://doi.org/10.1016/j.tele.2018.11.008
  25. Bouffard, S., Giglio, D., Zheng, Z. (2021). Social Media and Romantic Relationship: Excessive Social Media Use Leads to Relationship Conflicts, Negative Outcomes, and Addiction via Mediated Pathways. Social Science Computer Review, 089443932110135. doi: https://doi.org/10.1177/08944393211013566
  26. Meleshko, Y. (2018). Method of collaborative filtration based on associative networks of users similarity. Advanced Information Systems, 2 (4), 55–59. doi: https://doi.org/10.20998/2522-9052.2018.4.09
  27. Barabash, O., Lukova-Chuiko, N., Sobchuk, V., Musienko, A. (2018). Application of Petri Networks for Support of Functional Stability of Information Systems. 2018 IEEE First International Conference on System Analysis & Intelligent Computing (SAIC). doi: https://doi.org/10.1109/saic.2018.8516747
  28. Akhramovich, V., Hrebennikov, A., Tsarenko, B., Stefurak, O. (2021). Method of calculating the protection of personal data from the reputation of users. Sciences of Europe, 80, 23–31. doi: https://doi.org/10.24412/3162-2364-2021-80-1-23-31
  29. Laptiev, O., Savchenko, V., Kotenko, A., Akhramovych, V., Samosyuk, V., Shuklin, G., Biehun, A. (2021). Method of Determining Trust and Protection of Personal Data in Social Networks. International Journal of Communication Networks and Information Security (IJCNIS), 13 (1), 15–21. Available at: https://www.ijcnis.org/index.php/ijcnis/article/view/4882
  30. Mahmoudi, A., Yaakub, M. R., Bakar, A. A. (2019). The Relationship between Online Social Network Ties and User Attributes. ACM Transactions on Knowledge Discovery from Data, 13 (3), 1–15. doi: https://doi.org/10.1145/3314204
  31. Mahmoudi, A., Yaakub, M. R., Abu Bakar, A. (2018). New time-based model to identify the influential users in online social networks. Data Technologies and Applications, 52 (2), 278–290. doi: https://doi.org/10.1108/dta-08-2017-0056
  32. Meleshko, Y., Drieiev, O., Drieieva, H. (2020). Method of identification bot profiles based on neural networks in recommendation systems. Advanced Information Systems, 4 (2), 24–28. doi: https://doi.org/10.20998/2522-9052.2020.2.05

Downloads

Published

2022-02-28

How to Cite

Akhramovych, V., Shuklin, G., Pepa, Y., Muzhanova, T., & Zozulia, S. (2022). Devising a procedure to determine the level of informational space security in social networks considering interrelations among users. Eastern-European Journal of Enterprise Technologies, 1(9(115), 63–74. https://doi.org/10.15587/1729-4061.2022.252135

Issue

Section

Information and controlling system