Method of calculating of the information in social networks protection depending on the number of communities

Authors

DOI:

https://doi.org/10.20535/2411-1031.2023.11.1.279868

Keywords:

social network, number of communities, security system, non-linearity, differential equation

Abstract

A mathematical model (linear system of differential equations) was developed and a research of the model of personal data protection against the number of communities and the intensity of data transfer in social networks was conducted. The linear system of information protection in social networks in the mathematical sense of this term is considered. When described by linear models, the object should be linear, at least approximately. This approach makes it quite simple to consider mathematical models. If such a thing is not noticed, it is necessary to examine the security system for linearity. Such dependecies has been studied: the dependence of the amount of information flow in the social network on the components of information protection, the amount of personal data, and the speed of the data flow; the security of the system on the size of the system (as well as on the amount of personal data); information security threats on the number of communities, and also calculated:  – coefficient representing the impact of information protection measures;  – coefficient representing the impact of data leakage rate;  – the coefficient representing the influence of the amount of data on its leakage;  – the coefficient representing the influence of the system size on system security;  – coefficient representing the impact of system security on data leakage;  – the number of connections in the social networks;  – number of vertices in the social networks;  – the parameter can be used to configure the network partitioning algorithm. The solution has been obtained - the harmonic oscillator equation, which breaks down into three cases: pre-resonance zone, resonance zone and post-resonance zone. So, the impact of the parameters of the number of communities on the parameters of the social network security system was investigated. Such a study is useful and important from the point of view of information protection in the network, since the parameters of the number of communities has significant influence, up to 100%, per protection indicator. As the result of research, it was established that social network security systems are non-linear.

Author Biography

Volodymyr Akhramovych, State university of telecommunications, Kyiv

doctor of technical sciences, senior research fellow, professor at the information and cyber defense systems academic department

References

V. Akhramovych, S. Lazarenko, H. Martynyuk, and Yu. Balanyuk, “Social network communities’ search model”, Ukrainian scientific journal of information security, vol. 26, no. 1, pp. 35-41, 2020, doi: https://doi.org/10.18372/2225-5036.26.14668.

N. Bailey, “The mathematical theory of infectious diseases and its applications”, New York, USA: Hafner Press, 1975.

F. Cohen, “Computer viruses, theory and experiments”, Computers & Security. vol. 6, рр. 22-35, 1987.

D. Gubanov, and A. Chkhartishvili, “A conceptual approach to the analysis of online social networks”, Upravlenie bol'shimi sistemami – Large-Scale Systems Control, No. 45, pp. 222−23, 2013.

J. Kephart, and S. White, “Directed-graph D. Gubanov, and A. Chkhartishvili, “A conceptual approach to the analysis of online social networks”, Automation and Remote Control, vol. 76(8), pp. 1455-1462, 2015, doi: https://doi.org/10.1134/S000511791508010X.

V. Savchenko, V. Akhramovych, T. Dzyuba, S. Laptiev, N. Lukova-Chuiko, and T. Laptievа, “Methodology for calculating information protection from parameters of its distribution in social networks”. in Proc. IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, 2021, pр. 99-105, doi: https://doi.org/10.1109/ATIT54053.2021.9678599.

O. Laptiev, V. Savchenko, A. Kotenko, V. Akhramovych, V. Samosyuk, G. Shuklin, and A. Biehun, “Method of determining trust and protection of personal data in social networks”, International journal of communication networks and information security (IJCNIS), № 1, pр. 15-21, 2021, doi: https://doi.org/10.17762/ijcnis.v13i1.4882.

V. Akhramovych, G. Shuklin, Y. Pepa, T. Muzhanova, and S. Zozuli, “Devising a procedure to determine the level of informational space security in social networks considering interrelations among users”, Eastern European Journal of Advanced Technologies, no. 1/9 (115). рр. 63-74, 2022, doi: https://doi.org/10.15587/1729-4061.2022.252135.

M. M. Williamson, and J. Léveillé, “An epidemiological model of virus spread and cleanup”, Hewlett-Packard Laboratories, February 27th, 2003. [Online]. Available: https://www.hpl.hp.com/techreports/2003/HPL-2003-39.pdf. Accessed on: Apr. 21, 2023.

Y. Zan, J. Wu, P. Li, and Q. Yu, “SICR rumor spreading model in complex networks: counterattack and self-resistance”, Physica A: Statistical Mechanics and its Applications, vol. 405, pp. 159-170, 2014.

Y. Zhang, and J. Zhu, “Stability analysis of I2S2R rumor spreading model in complex networks”, Physica A: Statistical Mechanics and its Applications, vol. 503, pp. 862-881, 2018.

N. Zhao, and X. Cheng, “Impact of information spread and investment behavior on the diffusion of internet investment products”, Physica A: Statistical Mechanics and its Applications, vol. 512, pp. 427-436, 2018.

D. Trubetskov, Introduction to synergetics. Chaos and Structures, 2nd ed. rev. and add. Moscow: Editorial URSS, 2004.

Published

2023-06-29

How to Cite

Akhramovych, V. (2023). Method of calculating of the information in social networks protection depending on the number of communities. Collection "Information Technology and Security", 11(1), 15–26. https://doi.org/10.20535/2411-1031.2023.11.1.279868

Issue

Section

INFORMATION SECURITY