METODA OBLICZANIA WSKAŹNIKA BEZPIECZEŃSTWA INFORMACJI W MEDIACH SPOŁECZNOŚCIOWYCH Z UWZGLĘDNIENIEM DŁUGOŚCI ŚCIEŻKI MIĘDZY KLIENTAMI
Volodymyr Akhramovych
State University of Information and Communication Technologies, Department of Information and Cybersecurity Systems (Ukraina)
https://orcid.org/0000-0002-0086-9131
Yuriy Pepa
State University of Information and Communication Technologies, Department of Robotics and Technical Systems (Ukraina)
https://orcid.org/0000-0003-2073-1364
Anton Zahynei
Antonio.com237@gmail.comState University of Information and Communication Technologies, Department of Information and Cybersecurity Systems (Ukraina)
https://orcid.org/0000-0002-0303-8501
Vadym Akhramovych
National Academy of Statistics, Accounting and Auditing, Computing Center (Ukraina)
https://orcid.org/0009-0003-2787-8745
Taras Dzyuba
State University of Information and Communication Technologies, Department of Information and Cybersecurity Management (Ukraina)
Ihor Danylov
State University of Information and Communication Technologies, Department of Information and Cybersecurity Systems (Ukraina)
https://orcid.org/0009-0000-1426-6414
Abstrakt
Przeanalizowano niejednorodne zależności różnicowe wskaźnika bezpieczeństwa informacji (HDISI) w mediach społecznościowych (SM), biorąc pod uwagę długość ścieżki między klientami (UDPC). Określono również odporność systemu wskaźników bezpieczeństwa informacji (RSIIS). HDISI w SM został opracowany w oparciu o warunki UDPC. Wykorzystuje on nowoczesne metody i techniki, w tym metodę niespecyficzną. Warunki stałego warunku wstępnego zostały utworzone zgodnie z siatką czasową. Ta zależność zapewnia kompleksowe wyjaśnienie, w jaki sposób poprzednia transformacja jest zastępowana przez upływający okres. SM to zbiór klientów i ich rodzajów komunikacji. Klientami mogą być jednostki, populacje, osady lub kraje. Komunikacja jest rozumiana jako coś więcej niż tylko przekazywanie i odbieranie informacji. Obejmuje również interakcję, wymianę wiedzy i doświadczenia oraz dyskusję. Pod kątem matematyki przeanalizowano model HDISI oparty na niejednorodnych równaniach różniczkowych (NDE) i przeprowadzono jego transcendentalne badanie. Transcendentalne badanie nieliniowych modeli HDISI w SM wykazało, że charakterystyka UDPC znacząco wpływa na wskaźnik bezpieczeństwa informacji (ISI) – nawet do stu procent. Zbadano diagramy fazowe (PDs) ISI, które wskazują na najwyższy ISI nawet przy maksymalnych parametrach złośliwych działań. Po raz pierwszy przeprowadzono analizę zaprojektowanych struktur HDISI i uzyskano kryteria liczbowe między możliwościami UDPC a miarami ISI, a także najwyższym ISI, co pokazuje naukową treść tego artykułu.
Słowa kluczowe:
media społecznościowe, modele, wskaźnik bezpieczeństwa informacjiBibliografia
Akhramovych V. et al.: Devising a Procedure to Determine the Level of Informational Space Security in Social Networks Considering Interrelations Among Users. Eastern-European Journal of Enterprise Technologies 1 (9(115)), 2022, 63–74.
DOI: https://doi.org/10.15587/1729-4061.2022.252135
Google Scholar
Akhramovych V.: Method of Calculation of Protection of Information from the Average Length of the Road Between Users in Social Networks. Collection Information Technology and Security 10(2), 2022, 153–164.
DOI: https://doi.org/10.20535/2411-1031.2022.10.2.270403
Google Scholar
Gubanov D., Chkhartishvili A.: A Conceptual Approach to the Analysis of Online Social Networks. Large-Scale Systems Control 45, 2013, 222–236.
Google Scholar
Hanneman R., Riddle M.: Introduction to Social Network Methods [https://faculty.ucr.edu/~hanneman/nettext/C7_Connection.html#distance].
Google Scholar
Khrashchevskyi R. et al.: Method of Calculating Information Protection from Mutual Influence of Users in Social Networks. International Journal of Computer Network and Information Security – IJCNIS 15(5), 2023, 27–40 [https://doi.org/10.5815/ijcnis.2023.05.03].
DOI: https://doi.org/10.5815/ijcnis.2023.05.03
Google Scholar
Nosouhi M. R.: Location Privacy Protection in Social Networks. Ph.D. thesis. University of Technology Sydney, Sydney 2020 [http://hdl.handle.net/10453/143934].
Google Scholar
Rohloff K.: Stochastic Behavior of Random Constant Scanning Worms. The 14th ICCCN, 2005, 339–344.
Google Scholar
Savchenko V. et al.: Method of Calculation of Information Protection from Clusterization Ratio in Social Networks. Proceedings of the 3rd International Conference on Information Security and Information Technologies – ISecIT 2021, 24–31.
DOI: https://doi.org/10.1109/ATIT54053.2021.9678599
Google Scholar
Savchenko V. et al.: Methodology for Calculating Information Protection from Parameters of its Distribution in Social Networks. 3rd International Conference on Advanced Trends in Information Theory – ATIT, 99–105.
Google Scholar
Seyyed M. S. et al.: Privacy Protection Scheme for Mobile Social Network. Journal of King Saud University – Computer and Information Sciences 34(7), 2022, 4062–4074.
DOI: https://doi.org/10.1016/j.jksuci.2022.05.011
Google Scholar
Shehab M. et al.: Access Control for Online Social Networks Third Party Applications. Computers & Security 31(8), 2012, 897–911.
DOI: https://doi.org/10.1016/j.cose.2012.07.008
Google Scholar
Trubetskoy D. I.: Introduction to Synergetics. Chaos and structures. Editorial, Moscow 2004.
Google Scholar
Yating L. et al.: Intelligent Privacy Protection of End User in Long Distance Education. Mobile Networks and Applications 27, 2022, 1162–1173.
DOI: https://doi.org/10.1007/s11036-022-01950-6
Google Scholar
Yevseiev S. et al.: Modeling the Protection of Personal Data from Trust and the Amount of Information on Social Networks. Eureka Physics and Engineering 13(1), 2021, 24–31.
DOI: https://doi.org/10.21303/2461-4262.2021.001615
Google Scholar
Yüksel A. S., Halim Zaim A.: A Reputation-based Privacy Management System for Social Networking Sites. Turkish Journal of Electrical Engineering and Computer Sciences 21(3), 2015, 766–784.
Google Scholar
Zan Y., Wu J., Li P., Yu Q.: SICR Rumor Spreading Model in Complex Networks: Counterattack and Self-resistance. Physics A: Statistical Mechanics and its Applications 405, 2014, 159–170.
DOI: https://doi.org/10.1016/j.physa.2014.03.021
Google Scholar
Zhang Y., Pang J.: Distance and Friendship: A Distance-based Model for Link Prediction in Social Networks [https://satoss.uni.lu/members/jun/papers/APWeb15.pdf].
Google Scholar
Zhang Y., Zhu J.: Stability Analysis of I2S2R Rumor Spreading Model in Complex Networks. Physics A: Statistical Mechanics and its Applications 503, 2018, 862–881.
DOI: https://doi.org/10.1016/j.physa.2018.02.087
Google Scholar
Autorzy
Volodymyr AkhramovychState University of Information and Communication Technologies, Department of Information and Cybersecurity Systems Ukraina
https://orcid.org/0000-0002-0086-9131
Doctor of Technical Science, Professor , Associate Professor, Department of Information and Cybersecurity Systems of the State University of Information and Communication Technologies, Kyiv, Ukraine. Teaches the following disciplines:
- Methods of receiving and processing signals in information security systems;
- Cyber security of banking and commercial structures;
- Theory of information resources protection with limited access;
- Licensing, certification and certification in the security field of information activity objects;
- Organization of science and research.
Over 200 scientific papers have been published, 13 of it are the USSR copyright certificates, 14 patents of Russia. The sole author of four textbooks, co-authored with two textbooks and three workshops.
He has been working in the field of higher education for more than thirty years.
Autorzy
Yuriy PepaState University of Information and Communication Technologies, Department of Robotics and Technical Systems Ukraina
https://orcid.org/0000-0003-2073-1364
Candidate of technical sciences, Head of the Department of Robotics and Technical Systems, State University of Information and Communication Technologies, Kyiv, Ukraine.
Autorzy
Anton ZahyneiAntonio.com237@gmail.com
State University of Information and Communication Technologies, Department of Information and Cybersecurity Systems Ukraina
https://orcid.org/0000-0002-0303-8501
Interested in: cloud computing, fog computing, comprehensive information security systems.
Autorzy
Vadym AkhramovychNational Academy of Statistics, Accounting and Auditing, Computing Center Ukraina
https://orcid.org/0009-0003-2787-8745
Head of the computing center of the National Academy of Statistics, Accounting and Auditing, Kyiv, Ukraine.
Autorzy
Taras DzyubaState University of Information and Communication Technologies, Department of Information and Cybersecurity Management Ukraina
Teaching the following disciplines:
State information security
Audit of information security management systems
Regulatory and legal support of information security
He has been working in the field of higher education more than twenty years.
Autorzy
Ihor DanylovState University of Information and Communication Technologies, Department of Information and Cybersecurity Systems Ukraina
https://orcid.org/0009-0000-1426-6414
Postgraduate student оf Department of Information and Cybersecurity Systems of the State University of Information and Communication Technologies, Kyiv, Ukraine.
Statystyki
Abstract views: 105PDF downloads: 76