METHOD OF CALCULATION OF PROTECTION OF PERSONAL DATA FROM EXPANSION OF SOCIAL NETWORKS

Authors

  • Vladymyr Akhramovych State University of Telecommunications
  • Sergey Lazarenko National Aviation University
  • Tetiana Nimchenko National Aviation University
  • Lyubov Ryabova National Aviation University

DOI:

https://doi.org/10.18372/2310-5461.53.16504

Keywords:

networkexpansion, function, addiction, model, system, protection, a threat, socialnetwork, linearity, nonlinearity

Abstract

Calculating or estimation of the size of network expansion can give an idea of the impact of the spread of unauthorized information by malicious users. Once a malicious node is added to your contact list, it can access sensitive data and disclose it indiscriminately using social media tools such as placing ad boards, publishing images, etc. Such an impact can be measured by calculating the average ratio of friends, which can get confidential information disclosed by an intruder.

The completed study of the linear model of protection against network expansion allowed to obtain a system of linear equations of information protection in social networks (SN) depending on the type and parameters of network expansion.  The conditions of the system stationary position were found, the system of equations by the method of "small deviations" was solved, graphical dependencies were obtained, and the fluctuations of the protection system were iteration. The use of the method of differentiation of the protection function allowed to investigate the behavior of the system.

The equation of information protection is an equation of a harmonic oscillator with a suffocation amplitude and breaks down into three cases: pre-resonant zone, resonant and after resonance.

Obtained own and forced frequencies of oscillations of the system, period of oscillations, attenuation factor.

In the pre-resonance zone, the oscillation zone of the protection system is linear (except for the transition process), the protection indicator is the largest, in the resonance zone of the oscillation of the protection system is nonlinear, there is no protection, there is no protection in the resonant zone, the fluctuations in the protection system are nonlinear, the protection is minimal.

Author Biographies

Vladymyr Akhramovych, State University of Telecommunications

Doctor of Technical Sciences, Associate Professor, professor of the Department of inforrmation and cyber security systems

Sergey Lazarenko, National Aviation University

Doctor of Technical Sciences, Associate Professor, professor of the department of information security Faculty of cybersecurity, computer and software engineering 

Tetiana Nimchenko, National Aviation University

Candidate of Technical Sciences, Associate Professor, associate professor of the department of information security Faculty of cybersecurity, computer and software engineering 

Lyubov Ryabova, National Aviation University

assistant of the department of information security Faculty of cybersecurity, computer and software engineering

References

Ахрамович В., Лазаренко С., Мартинюк Г., Баланюк Ю. Модель пошуку співтовариств в соціальній мережі. Безпека інформації. К. НАУ. 2020. №1. С. 35–41. DOI: 10.18372/2225-5036.26.14668.

Shchypanskyi P., Savchenko V., Akhramovych V., Muzshanova T., Lehominova S., Chegrenets V. The Model of Secure Social Networks Activity Based on Graph Theory. International Journal of Innovative Technology and Exploring Engineering (IJITEE).ISSN: 2278-3075.2020. Vol. 9. Issue4. February 2020. pp. 1803-1810. URL: https://www.ijitee.org/download/volume-9-issue-4 (access date 20.11.2021)

Savchenko V., Akhramovych V., Tushych A., Sribna I., Vlasov I. Analysis of Social Network Parameters and the Likelihood of its Construction. International Journal of Emerging Trends in Engineering Research. ISSN 2347 –3983.2020. Vol. 8.No. 2.February2020.pр. 271-276. URL: http://www.warse.org/IJETER/static/pdf/file/ijeter05822020.pdf/(access date 20.11.2021)

Akhramovich V., Hrebennikov A., Tsarenko B., Stefurak O. Methodof-calculating-the-protectionofpersonaldatafromthereputationofusers. SciencesofEurope. Praha, Czech-Republic.2021. Vol. 1.No. 80. Pр. 23-31. URL: www.european-science.org (access date 20.11.2021)

Bailey N. The Mathematical Theory of Infectious Diseases and Its Applications. New York: Hafner Press, 1 Applications, Vol. 405, July 2014. pp. 159–170.

Cohen F. Computer viruses, theory and experiments, Computers & Security.1987. Vol. 6. pp. 22 - 35.

Rohloff K. Stochastic Behavior of Random Constant Scanning Worms. The 14th ICCCN(17-19 Oct. 2005, San Diego, CA, USA). 2005. pp. 339 - 344.

Trubetskov D. Introduction to Synergetics. Chaos and structures. Edition 2 corrected and supplemented. – М. Edytorial. MDFS. 2004. 240p.

Matthew M.,Laeveillae J. Epidemiological model of virus spread and cleanup. Hewlett-Packard Laboratories Bristol (February 27th, 2003). URL: http://www.hpl.hp.com/techreports/2003/HPL-2003-39.pdf (access date 20.11.2021)

Zan Y., Wu J., Li P., Yu Q. SICR rumor spreading model in complex networks: Counterattack and self-resistance. Physica A: Statistical Mechanics and its Applications.2014. Vol. 405. July 2014. pp. 159–170.

Zhang Y., Zhu J. Stability analysis of I2S2R rumor spreading model in complex networks. Physica A: Statistical Mechanics and its Applications.2018. Vol. 503, August 2018. pp. 862–881.

Zhao N., Cheng X. Impact of information spread and investment behavior on the diffusion of internet investment products. Physica A: Statistical Mechanics and its Applications. 2018. Vol. 512, December 2018. pp. 427–436

Published

2022-04-30

Issue

Section

Information technology, cybersecurity