Devising a procedure to determine the level of informational space security in social networks considering interrelations among users
DOI:
https://doi.org/10.15587/1729-4061.2022.252135Keywords:
social network, users’ relationships, security system, nonlinearity, differential equations, procedureAbstract
Linear and dynamic models of the system of information security in social networks, taking into consideration the relationships between users, were studied and the resistance of the security system was analyzed.
There is a practical interest in studying dependence of the behavior of the system of social network security on the parameters of users’ interaction. Dynamic systems of information security in social networks in the mathematical sense of this term were considered. A dynamic system refers to any object or process, for which the concept of state as a totality of certain magnitudes at a given time is unambiguously defined and the law that describes a change (evolution) of the initial state over time was assigned.
The network of social interactions consists of a totality of social users and a totality of the relations between them. Individuals, social groups, organizations, cities, countries can act as users. Relations imply not only communication interactions between users but also relations of the exchange of various resources and activities, including conflict relations.
As a result of research, it was found that the security systems of a social network are nonlinear. Theoretical study of the dynamic behavior of an actual object requires the creation of its mathematical model. The procedure for developing a model is to compile mathematical equations based on physical laws. These laws are stated in the language of differential equations.
Phase portraits of the data security system in the MATLAB/Multisim program, which indicate the stability of a security system in the working range of parameters even at the maximum value of the impacts, were determined.
Thus, the influence of users’ interaction parameters on the parameters of the system of social network security was explored. Such study is useful and important in terms of information security in the network, since the parameters of users’ interaction significantly affect, up to 100 %, the security indicator.
References
- Newcomb, T. M. (1953). An approach to the study of communicative acts. Psychological Review, 60 (6), 393–404. doi: https://doi.org/10.1037/h0063098
- Cartwright, D., Harary, F. (1956). Structural balance: a generalization of Heider's theory. Psychological Review, 63 (5), 277–293. doi: https://doi.org/10.1037/h0046049
- Glaser, W. A. (1959). Job Mobility between Government and other Social Structures. Political Research, Organization and Design, 3 (3), 20–23. doi: https://doi.org/10.1177/000276425900300307
- Bavelas, A. (1950). Communication Patterns in Task‐Oriented Groups. The Journal of the Acoustical Society of America, 22 (6), 725–730. doi: https://doi.org/10.1121/1.1906679
- Festinger, L. (1954). A Theory of Social Comparison Processes. Human Relations, 7 (2), 117–140. doi: https://doi.org/10.1177/001872675400700202
- Radcliffe-Brown, A. R. (1935). On the Concept of Function in Social Science. American Anthropologist, 37 (3), 394–402. doi: https://doi.org/10.1525/aa.1935.37.3.02a00030
- Heider, F. (1946). Attitudes and Cognitive Organization. The Journal of Psychology, 21 (1), 107–112. doi: https://doi.org/10.1080/00223980.1946.9917275
- Berkman, L. (2020). The Intelligent Control System for infocommunication networks. International Journal of Emerging Trends in Engineering Research, 8 (5), 1920–1925. doi: https://doi.org/10.30534/ijeter/2020/73852020
- Semenov, S., Weilin, C. (2020). Testing process for penetration into computer systems mathematical model modification. Advanced Information Systems, 4 (3), 133–138. doi: https://doi.org/10.20998/2522-9052.2020.3.19
- Semenov, S., Weilin, C., Zhang, L., Bulba, S. (2021). Automated penetration testing method using deep machine learning technology. Advanced Information Systems, 5 (3), 119–127. doi: https://doi.org/10.20998/2522-9052.2021.3.16
- Cherneva, G., Khalimov, P. (2021). Mutation testing of access control policies. Advanced Information Systems, 5 (1), 118–122. doi: https://doi.org/10.20998/2522-9052.2021.1.17
- Liqiang, Z., Weiling, C., Rabčan, J., Davydov, V., Miroshnichenko, N. (2021). Analysis and comparative studies of software penetration testing methods. Advanced Information Systems, 5 (2), 136–140. doi: https://doi.org/10.20998/2522-9052.2021.2.20
- Mashkov, V. A., Barabash, O. V. (1998). Self-checking and self-diagnosis of module systems on the principle of walking diagnostic kernel. Engineering Simulation. Amsterdam: OPA, 15 (1), 43–51.
- Radkevych, O. P. (2012). Konfidentsiynist personalnoi informatsiyi v sotsialnykh merezhakh. Visnyk Vyshchoi rady yustytsiyi, 3 (11), 215–224.
- Laptiev, O., Shuklin, G., Savchenko, V., Barabash, O., Musienko, A., Haidur, H. (2019). The Method of Hidden Transmitters Detection based on the Differential Transformation Model. International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE), 8 (6), 2840–2846. doi: https://doi.org/10.30534/ijatcse/2019/26862019
- Podobnik, V., Lovrek, I. (2015). Implicit Social Networking: Discovery of Hidden Relationships, Roles and Communities among Consumers. Procedia Computer Science, 60, 583–592. doi: https://doi.org/10.1016/j.procs.2015.08.185
- Farseev, A., Nie, L., Akbari, M., Chua, T.-S. (2015). Harvesting Multiple Sources for User Profile Learning. Proceedings of the 5th ACM on International Conference on Multimedia Retrieval. doi: https://doi.org/10.1145/2671188.2749381
- Chorley, M. J., Whitaker, R. M., Allen, S. M. (2015). Personality and location-based social networks. Computers in Human Behavior, 46, 45–56. doi: https://doi.org/10.1016/j.chb.2014.12.038
- Wilson, C., Sala, A., Puttaswamy, K. P. N., Zhao, B. Y. (2012). Beyond Social Graphs. ACM Transactions on the Web, 6 (4), 1–31. doi: https://doi.org/10.1145/2382616.2382620
- Souri, A., Nourozi, M., Rahmani, A. M., Jafari Navimipour, N. (2019). A model checking approach for user relationship management in the social network. Kybernetes, 48 (3), 407–423. doi: https://doi.org/10.1108/k-02-2018-0092
- Grevtsov, V. E. (2010). Razvitie sotsial'nyh svyazey i otnosheniy v virtual'nyh soobschestvah. Sotsiosfera, 1, 59–61.
- Kaltenbrunner, A., Scellato, S., Volkovich, Y., Laniado, D., Currie, D., Jutemar, E. J., Mascolo, C. (2012). Far from the eyes, close on the web. Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks - WOSN ’12. doi: https://doi.org/10.1145/2342549.2342555
- Akhramovych V. M. (2019). Model of Mutual Relationship of Users in Social Networks. Modern Information Security, 3, 42–50. doi: https://doi.org/10.31673/2409-7292.2019.034250
- Asim, Y., Malik, A. K., Raza, B., Shahid, A. R. (2019). A trust model for analysis of trust, influence and their relationship in social network communities. Telematics and Informatics, 36, 94–116. doi: https://doi.org/10.1016/j.tele.2018.11.008
- Bouffard, S., Giglio, D., Zheng, Z. (2021). Social Media and Romantic Relationship: Excessive Social Media Use Leads to Relationship Conflicts, Negative Outcomes, and Addiction via Mediated Pathways. Social Science Computer Review, 089443932110135. doi: https://doi.org/10.1177/08944393211013566
- Meleshko, Y. (2018). Method of collaborative filtration based on associative networks of users similarity. Advanced Information Systems, 2 (4), 55–59. doi: https://doi.org/10.20998/2522-9052.2018.4.09
- Barabash, O., Lukova-Chuiko, N., Sobchuk, V., Musienko, A. (2018). Application of Petri Networks for Support of Functional Stability of Information Systems. 2018 IEEE First International Conference on System Analysis & Intelligent Computing (SAIC). doi: https://doi.org/10.1109/saic.2018.8516747
- Akhramovich, V., Hrebennikov, A., Tsarenko, B., Stefurak, O. (2021). Method of calculating the protection of personal data from the reputation of users. Sciences of Europe, 80, 23–31. doi: https://doi.org/10.24412/3162-2364-2021-80-1-23-31
- Laptiev, O., Savchenko, V., Kotenko, A., Akhramovych, V., Samosyuk, V., Shuklin, G., Biehun, A. (2021). Method of Determining Trust and Protection of Personal Data in Social Networks. International Journal of Communication Networks and Information Security (IJCNIS), 13 (1), 15–21. Available at: https://www.ijcnis.org/index.php/ijcnis/article/view/4882
- Mahmoudi, A., Yaakub, M. R., Bakar, A. A. (2019). The Relationship between Online Social Network Ties and User Attributes. ACM Transactions on Knowledge Discovery from Data, 13 (3), 1–15. doi: https://doi.org/10.1145/3314204
- Mahmoudi, A., Yaakub, M. R., Abu Bakar, A. (2018). New time-based model to identify the influential users in online social networks. Data Technologies and Applications, 52 (2), 278–290. doi: https://doi.org/10.1108/dta-08-2017-0056
- Meleshko, Y., Drieiev, O., Drieieva, H. (2020). Method of identification bot profiles based on neural networks in recommendation systems. Advanced Information Systems, 4 (2), 24–28. doi: https://doi.org/10.20998/2522-9052.2020.2.05
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Volodymyr Akhramovych, German Shuklin, Yuriy Pepa, Tetiana Muzhanova, Serhii Zozulia
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.