METHOD FOR CALCULATING THE INFORMATION SECURITY INDICATOR IN SOCIAL MEDIA WITH CONSIDERATION OF THE PATH DURATION BETWEEN CLIENTS

Volodymyr Akhramovych


State University of Information and Communication Technologies, Department of Information and Cybersecurity Systems (Ukraine)
https://orcid.org/0000-0002-0086-9131

Yuriy Pepa


State University of Information and Communication Technologies, Department of Robotics and Technical Systems (Ukraine)
https://orcid.org/0000-0003-2073-1364

Anton Zahynei

Antonio.com237@gmail.com
State University of Information and Communication Technologies, Department of Information and Cybersecurity Systems (Ukraine)
https://orcid.org/0000-0002-0303-8501

Vadym Akhramovych


National Academy of Statistics, Accounting and Auditing, Computing Center (Ukraine)
https://orcid.org/0009-0003-2787-8745

Taras Dzyuba


State University of Information and Communication Technologies, Department of Information and Cybersecurity Management (Ukraine)

Ihor Danylov


State University of Information and Communication Technologies, Department of Information and Cybersecurity Systems (Ukraine)
https://orcid.org/0009-0000-1426-6414

Abstract

Heterogeneous differential dependencies of the information security indicator (HDISI) in social media (SM) were analyzed, taking into account the duration of the path between clients (UDPC). The resilience of the information security indicator system (RSIIS) was also determined. The HDISI in SM was developed based on UDPC conditions. It uses modern methods and techniques, including a non-specific method. The conditions of a fixed precondition were formed according to the time grid. This dependency provides a comprehensive explanation of how the previous transformation is replaced by the elapsed period. SM is a set of clients and their types of communication. Clients can be individuals, populations, settlements, or countries. Communication is understood as more than just the transmission and receipt of information. It also includes interaction, the exchange of knowledge and expertise, and discussion. Under the angle of mathematics, the HDISI model based on non-homogeneous differential equations (NDE) was analyzed and its transcendental study was done. The transcendental study of nonlinear HDISI models in SM showed that the characteristics of UDPC significantly affect the information security indicator (ISI) - up to one hundred percent. Phase diagrams (PDs) of ISI were studied, which indicate the highest ISI even at the maximum parameters of malicious actions. For the first time, the analysis of designed HDISI structures was carried out and numerical criteria between the capabilities of UDPC and the measures of ISI, as well as the highest ISI, were obtained, which shows the scientific content of this article.


Keywords:

social media, mathematical models, information security indicator

Akhramovych V. et al.: Devising a Procedure to Determine the Level of Informational Space Security in Social Networks Considering Interrelations Among Users. Eastern-European Journal of Enterprise Technologies 1 (9(115)), 2022, 63–74.
DOI: https://doi.org/10.15587/1729-4061.2022.252135   Google Scholar

Akhramovych V.: Method of Calculation of Protection of Information from the Average Length of the Road Between Users in Social Networks. Collection Information Technology and Security 10(2), 2022, 153–164.
DOI: https://doi.org/10.20535/2411-1031.2022.10.2.270403   Google Scholar

Gubanov D., Chkhartishvili A.: A Conceptual Approach to the Analysis of Online Social Networks. Large-Scale Systems Control 45, 2013, 222–236.
  Google Scholar

Hanneman R., Riddle M.: Introduction to Social Network Methods [https://faculty.ucr.edu/~hanneman/nettext/C7_Connection.html#distance].
  Google Scholar

Khrashchevskyi R. et al.: Method of Calculating Information Protection from Mutual Influence of Users in Social Networks. International Journal of Computer Network and Information Security – IJCNIS 15(5), 2023, 27–40 [https://doi.org/10.5815/ijcnis.2023.05.03].
DOI: https://doi.org/10.5815/ijcnis.2023.05.03   Google Scholar

Nosouhi M. R.: Location Privacy Protection in Social Networks. Ph.D. thesis. University of Technology Sydney, Sydney 2020 [http://hdl.handle.net/10453/143934].
  Google Scholar

Rohloff K.: Stochastic Behavior of Random Constant Scanning Worms. The 14th ICCCN, 2005, 339–344.
  Google Scholar

Savchenko V. et al.: Method of Calculation of Information Protection from Clusterization Ratio in Social Networks. Proceedings of the 3rd International Conference on Information Security and Information Technologies – ISecIT 2021, 24–31.
DOI: https://doi.org/10.1109/ATIT54053.2021.9678599   Google Scholar

Savchenko V. et al.: Methodology for Calculating Information Protection from Parameters of its Distribution in Social Networks. 3rd International Conference on Advanced Trends in Information Theory – ATIT, 99–105.
  Google Scholar

Seyyed M. S. et al.: Privacy Protection Scheme for Mobile Social Network. Journal of King Saud University – Computer and Information Sciences 34(7), 2022, 4062–4074.
DOI: https://doi.org/10.1016/j.jksuci.2022.05.011   Google Scholar

Shehab M. et al.: Access Control for Online Social Networks Third Party Applications. Computers & Security 31(8), 2012, 897–911.
DOI: https://doi.org/10.1016/j.cose.2012.07.008   Google Scholar

Trubetskoy D. I.: Introduction to Synergetics. Chaos and structures. Editorial, Moscow 2004.
  Google Scholar

Yating L. et al.: Intelligent Privacy Protection of End User in Long Distance Education. Mobile Networks and Applications 27, 2022, 1162–1173.
DOI: https://doi.org/10.1007/s11036-022-01950-6   Google Scholar

Yevseiev S. et al.: Modeling the Protection of Personal Data from Trust and the Amount of Information on Social Networks. Eureka Physics and Engineering 13(1), 2021, 24–31.
DOI: https://doi.org/10.21303/2461-4262.2021.001615   Google Scholar

Yüksel A. S., Halim Zaim A.: A Reputation-based Privacy Management System for Social Networking Sites. Turkish Journal of Electrical Engineering and Computer Sciences 21(3), 2015, 766–784.
  Google Scholar

Zan Y., Wu J., Li P., Yu Q.: SICR Rumor Spreading Model in Complex Networks: Counterattack and Self-resistance. Physics A: Statistical Mechanics and its Applications 405, 2014, 159–170.
DOI: https://doi.org/10.1016/j.physa.2014.03.021   Google Scholar

Zhang Y., Pang J.: Distance and Friendship: A Distance-based Model for Link Prediction in Social Networks [https://satoss.uni.lu/members/jun/papers/APWeb15.pdf].
  Google Scholar

Zhang Y., Zhu J.: Stability Analysis of I2S2R Rumor Spreading Model in Complex Networks. Physics A: Statistical Mechanics and its Applications 503, 2018, 862–881.
DOI: https://doi.org/10.1016/j.physa.2018.02.087   Google Scholar

Download


Published
2024-03-31

Cited by

Akhramovych, V., Pepa, Y., Zahynei, A., Akhramovych, V., Dzyuba, T., & Danylov, I. (2024). METHOD FOR CALCULATING THE INFORMATION SECURITY INDICATOR IN SOCIAL MEDIA WITH CONSIDERATION OF THE PATH DURATION BETWEEN CLIENTS. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 14(1), 71–77. https://doi.org/10.35784/iapgos.5720

Authors

Volodymyr Akhramovych 

State University of Information and Communication Technologies, Department of Information and Cybersecurity Systems Ukraine
https://orcid.org/0000-0002-0086-9131

Doctor of Technical Science, Professor , Associate Professor, Department of Information and Cybersecurity Systems of the State University of Information and Communication Technologies, Kyiv, Ukraine. Teaches the following disciplines:

- Methods of receiving and processing signals in information security systems;

- Cyber security of banking and commercial structures;

- Theory of information resources protection with limited access;

- Licensing, certification and certification in the security field of information activity objects;

- Organization of science and research.

Over 200 scientific papers have been published, 13 of it are the USSR copyright certificates, 14 patents of Russia. The sole author of four textbooks, co-authored with two textbooks and three workshops.

He has been working in the field of higher education for more than thirty years.


Authors

Yuriy Pepa 

State University of Information and Communication Technologies, Department of Robotics and Technical Systems Ukraine
https://orcid.org/0000-0003-2073-1364

Candidate of technical sciences, Head of the Department of Robotics and Technical Systems, State University of Information and Communication Technologies, Kyiv, Ukraine.


Authors

Anton Zahynei 
Antonio.com237@gmail.com
State University of Information and Communication Technologies, Department of Information and Cybersecurity Systems Ukraine
https://orcid.org/0000-0002-0303-8501

Postgraduate student, senior lecturer. Department of Information and Cybersecurity Systems of the State University of Information and Communication Technologies, Kyiv, Ukraine.


Authors

Vadym Akhramovych 

National Academy of Statistics, Accounting and Auditing, Computing Center Ukraine
https://orcid.org/0009-0003-2787-8745

Head of the computing center of the National Academy of Statistics, Accounting and Auditing, Kyiv, Ukraine.


Authors

Taras Dzyuba 

State University of Information and Communication Technologies, Department of Information and Cybersecurity Management Ukraine

Ph.D. in  Technical Science, Associate Professor of the Department of Information and Cybersecurity Management, State University of Information and Communication Technologies, Kyiv, Ukraine.


Authors

Ihor Danylov 

State University of Information and Communication Technologies, Department of Information and Cybersecurity Systems Ukraine
https://orcid.org/0009-0000-1426-6414

Postgraduate student оf  Department of Information and Cybersecurity Systems of the State University of Information and Communication Technologies, Kyiv, Ukraine.



Statistics

Abstract views: 45
PDF downloads: 10


License

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.