# Method of calculation of protection of information from the average length of the road between users in social networks

## Authors

• Volodymyr Akhramovych State university of telecommunications, Kyiv, Ukraine

## Keywords:

social network, average path length, protection systems, nonlinearity, differential equations

## Abstract

A mathematical model (linear system of differential equations) was developed and a study of the model of personal data protection from the average path length and intensity of data transmission in social networks was conducted. According to research conducted by Milgrad, the maximum average path length between network users does not exceed six. There is a practical interest in studying the behavior of the system of protection of social networks from the average path length between network users. Theoretical study of the dynamic behavior of a real object requires the creation of its mathematical model. The procedure for developing a model is to compile mathematical equations based on physical laws. These laws are formulated in the language of differential equations. The linear system of information protection in social networks in the mathematical sense of this term is considered. When describing linear models, the object must be at least approximately linear. This approach allows you to easily consider mathematical models. If such a phenomenon is not observed, it is necessary to study the protection system for linearity. Dependencies are considered: the amount of information flow in the social network from the components of information protection, the amount of personal data, and the speed of data flow; security of the system from the size of the system (as well as from the amount of personal data); information security threats from medium path length. A solution is obtained – the equation of a harmonic oscillator, which is divided into three cases: preresonance zone, resonance and afterresonance. Thus, the influence of the parameters of the average path length between users on the parameters of the social network protection system is investigated. Such research is useful and important from the point of view of information protection in the network, as the parameters of the average path length between users significantly affect, up to 100%, the protection rate. As a result of research it is established that social network protection systems are nonlinear.

## Author Biography

### Volodymyr Akhramovych, State university of telecommunications, Kyiv

doctor of technical sciences, senior research fellow, professor at the information and cyber defense systems ademic department

## References

V. Akhramovich, A. Hrebennikov, B. Tsarenko, and O. Stefurak, “Method of calculating the protection of personal data from the reputation of users”, Sciences of Europe, vol. 1, no. 80, рр. 23-31, 2021.

N. Bailey, The mathematical theory of infectious diseases and its applications. New York : Hafner Press, 1975.

F. Cohen, “Computer viruses, theory and experiments”, Computers & Security. vol. 6, iss. 1, рр. 22-35, 1987, doi: https://doi.org/10.1016/0167-4048(87)90122-2.

D. Gubanov, and A. Chkhartishvili, “A conceptual approach to the analysis of online social networks”, Automation and Remote Control, vol. 76, iss. 8, pp. 1455-1462, 2015, doi: https://doi.org/10.1134/S000511791508010X.

J. Kephart, and S. White, “Directed-graph epidemiological model of computer viruses”, in Proc. IEEE Symposium on Security and Privacy, Oakland, CA, USA, 1991, рр. 343.

O. Laptiev, V. Savchenko, A. Kotenko, V. Akhramovych, V. Samosyuk, G. Shuklin, and A. Biehun, “Method of determining trust and protection of personal data in social networks”, International Journal of Communication Networks and Information Security (IJCNIS), vol. 13, no. 1, рр. 15-21, 2021, doi: https://doi.org/10.17762/ijcnis.v13i1.4882.

P. Shchypanskyi, V. Savchenko, V. Akhramovych, T. Muzshanova, S. Lehominova, and V. Chegrenets, “The model of secure social networks activity based on graph theory”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 9, iss. 4, рp. 1803-1810, 2020, doi: https://doi.org/10.35940/ijitee.D1768.029420.

V. Akhramovych, G. Shuklin, Y. Pepa, T. Muzhanova, and S. Zozuli, “Devising a procedure to determine the level of informational space security in social networks considering interrelations among users”, Eastern European Journal of Advanced Technologies, vol. 1, no. 9 (115), pp. 63-74, 2022, doi: https://doi.org/10.15587/1729-4061.2022.252135.

M. M. Williamson, and L. Jasmin, “An epidemiological model of virus spread and cleanup”, Hewlett-Packard Laboratories, 2003. [Online]. Available: https://www.hpl.hp.com/techreports/2003/HPL-2003-39.pdf. Accessed on: May 29, 2022.

Y. Zan, J. Wu, P. Li, and Q. Yu, “SICR rumor spreading model in complex networks: counterattack and self-resistance”, Physica A: Statistical Mechanics and its Applications, vol. 405, pp. 159-170, 2014, doi: https://doi.org/10.1016/j.physa.2014.03.021.

Y. Zhang, and J. Zhu, “Stability analysis of I2S2R rumor spreading model in complex networks”, Physica A: Statistical Mechanics and its Applications, vol. 503, pp. 862-881, 2018.

N. Zhao, and X. Cheng, “Impact of information spread and investment behavior on the diffusion of internet investment products”, Physica A: Statistical Mechanics and its Applications, vol. 512, pp. 427-436, 2018, doi: https://doi.org/10.1016/j.physa.2018.08.075.

D. Trubetskov, Introduction to synergetics. Chaos and Structures. Moscow: Editorial URSS, 2004.

2022-12-29

## How to Cite

Akhramovych, V. (2022). Method of calculation of protection of information from the average length of the road between users in social networks. Collection "Information Technology and Security", 10(2), 153–164. https://doi.org/10.20535/2411-1031.2022.10.2.270403

## Section

INFORMATION SECURITY