Method of calculation of protection of information from the average length of the road between users in social networks
DOI:
https://doi.org/10.20535/2411-1031.2022.10.2.270403Keywords:
social network, average path length, protection systems, nonlinearity, differential equationsAbstract
A mathematical model (linear system of differential equations) was developed and a study of the model of personal data protection from the average path length and intensity of data transmission in social networks was conducted. According to research conducted by Milgrad, the maximum average path length between network users does not exceed six. There is a practical interest in studying the behavior of the system of protection of social networks from the average path length between network users. Theoretical study of the dynamic behavior of a real object requires the creation of its mathematical model. The procedure for developing a model is to compile mathematical equations based on physical laws. These laws are formulated in the language of differential equations. The linear system of information protection in social networks in the mathematical sense of this term is considered. When describing linear models, the object must be at least approximately linear. This approach allows you to easily consider mathematical models. If such a phenomenon is not observed, it is necessary to study the protection system for linearity. Dependencies are considered: the amount of information flow in the social network from the components of information protection, the amount of personal data, and the speed of data flow; security of the system from the size of the system (as well as from the amount of personal data); information security threats from medium path length. A solution is obtained – the equation of a harmonic oscillator, which is divided into three cases: preresonance zone, resonance and afterresonance. Thus, the influence of the parameters of the average path length between users on the parameters of the social network protection system is investigated. Such research is useful and important from the point of view of information protection in the network, as the parameters of the average path length between users significantly affect, up to 100%, the protection rate. As a result of research it is established that social network protection systems are nonlinear.
References
V. Akhramovich, A. Hrebennikov, B. Tsarenko, and O. Stefurak, “Method of calculating the protection of personal data from the reputation of users”, Sciences of Europe, vol. 1, no. 80, рр. 23-31, 2021.
N. Bailey, The mathematical theory of infectious diseases and its applications. New York : Hafner Press, 1975.
F. Cohen, “Computer viruses, theory and experiments”, Computers & Security. vol. 6, iss. 1, рр. 22-35, 1987, doi: https://doi.org/10.1016/0167-4048(87)90122-2.
D. Gubanov, and A. Chkhartishvili, “A conceptual approach to the analysis of online social networks”, Automation and Remote Control, vol. 76, iss. 8, pp. 1455-1462, 2015, doi: https://doi.org/10.1134/S000511791508010X.
J. Kephart, and S. White, “Directed-graph epidemiological model of computer viruses”, in Proc. IEEE Symposium on Security and Privacy, Oakland, CA, USA, 1991, рр. 343.
O. Laptiev, V. Savchenko, A. Kotenko, V. Akhramovych, V. Samosyuk, G. Shuklin, and A. Biehun, “Method of determining trust and protection of personal data in social networks”, International Journal of Communication Networks and Information Security (IJCNIS), vol. 13, no. 1, рр. 15-21, 2021, doi: https://doi.org/10.17762/ijcnis.v13i1.4882.
P. Shchypanskyi, V. Savchenko, V. Akhramovych, T. Muzshanova, S. Lehominova, and V. Chegrenets, “The model of secure social networks activity based on graph theory”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 9, iss. 4, рp. 1803-1810, 2020, doi: https://doi.org/10.35940/ijitee.D1768.029420.
V. Akhramovych, G. Shuklin, Y. Pepa, T. Muzhanova, and S. Zozuli, “Devising a procedure to determine the level of informational space security in social networks considering interrelations among users”, Eastern European Journal of Advanced Technologies, vol. 1, no. 9 (115), pp. 63-74, 2022, doi: https://doi.org/10.15587/1729-4061.2022.252135.
M. M. Williamson, and L. Jasmin, “An epidemiological model of virus spread and cleanup”, Hewlett-Packard Laboratories, 2003. [Online]. Available: https://www.hpl.hp.com/techreports/2003/HPL-2003-39.pdf. Accessed on: May 29, 2022.
Y. Zan, J. Wu, P. Li, and Q. Yu, “SICR rumor spreading model in complex networks: counterattack and self-resistance”, Physica A: Statistical Mechanics and its Applications, vol. 405, pp. 159-170, 2014, doi: https://doi.org/10.1016/j.physa.2014.03.021.
Y. Zhang, and J. Zhu, “Stability analysis of I2S2R rumor spreading model in complex networks”, Physica A: Statistical Mechanics and its Applications, vol. 503, pp. 862-881, 2018.
N. Zhao, and X. Cheng, “Impact of information spread and investment behavior on the diffusion of internet investment products”, Physica A: Statistical Mechanics and its Applications, vol. 512, pp. 427-436, 2018, doi: https://doi.org/10.1016/j.physa.2018.08.075.
D. Trubetskov, Introduction to synergetics. Chaos and Structures. Moscow: Editorial URSS, 2004.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Collection "Information Technology and Security"
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).