GRAPH-BASED ANALYSIS OF INFORMATION FLOWS IN TELEGRAM FOR CYBERSECURITY THREAT DETECTION

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.27.746

Keywords:

Cybersecurity, Information Flows, Messengers, Graph Databases, Data Collection Automation

Abstract

This paper explores modern methods for analyzing information flows in messengers, emphasizing their role in cybersecurity. The study compares different approaches, including API-based data collection, the use of graph and relational databases, and the automation of open data gathering. Special attention is given to the theoretical foundations of information flow analysis, focusing on the social graph concept and its application in modeling the dissemination of information across networks. The advantages of graph databases for detecting, visualizing, and analyzing networks of information distribution are examined, highlighting their effectiveness in uncovering hidden connections between channels. A prototype system for automating open data collection has been developed, integrating methods for extracting, processing, and structuring information from messenger platforms. The proposed system employs a combination of graph-based and relational techniques to enhance the accuracy and efficiency of detecting interconnections between communication channels. A series of computational experiments has been conducted to validate the effectiveness of the developed algorithms and software prototypes. The results confirm that combining these methods significantly improves the ability to identify information threats, including disinformation campaigns, automated bot activity, and coordinated attacks within messenger ecosystems. Actionable recommendations for the practical implementation of these approaches in cybersecurity tasks are provided. Specifically, they outline strategies for improving the monitoring and detection of malicious information activities, optimizing data collection and analysis pipelines, and leveraging graph-based insights to enhance situational awareness in digital communication environments. These findings contribute to the ongoing development of advanced cybersecurity solutions aimed at mitigating risks associated with modern information warfare.  

Downloads

Download data is not yet available.

References

Wasserman, S., & Faust, K. (1994). Social network analysis in the social and behavioral sciences. In Social network analysis: Methods and applications, 1–27.

Scott, J. P. (2000). Social network analysis: A handbook (2nd ed.). Sage Publications.

Watts, D. J., & Strogatz, S. (1998). Collective dynamics of 'small-world' networks. Nature, 393(6684), 440–442. https://doi.org/10.1038/30918

Borgatti, S. P. (2006). Identifying sets of key players in a social network. Computational & Mathematical Organization Theory, 12, 21–34.

Allen, J., Howland, B., Mobius, M., Rothschild, D., & Watts, D. J. (2020). Evaluating the fake news problem at the scale of the information ecosystem. Science Advances, 6(14), eaay3539. https://doi.org/10.1126/sciadv.aay3539

Bartley, N., Abeliuk, A., Ferrara, E., & Lerman, K. (2021). Auditing algorithmic bias on Twitter. 13th ACM Web Science Conference 2021, 65–73. https://doi.org/10.1145/34475353462491

Campbell, W., Dagli, C. K., & Weinstein, C. J. (2013). Social network analysis with content and graphs. Lincoln Laboratory Journal, 20, 62–81.

Weinstein, C., Campbell, W. M., Delaney, B. W., & O’Leary, G. (2009). Modeling and detection techniques for counter-terror social network analysis and intent recognition. IEEE Aerospace Conference, 1–16.

Carley, K. (2003). Dynamic network analysis. Dynamic social network modeling and analysis: Workshop summary and papers, 133–145.

Yan, G., Chen, G., Eidenbenz, S., & Li, N. (2011, March). Malware propagation in online social networks: nature, dynamics, and defense implications. 6th ACM Symposium on Information, Computer and Communications Security, 196–206.

Downloads


Abstract views: 1

Published

2025-03-27

How to Cite

Chornyi , A., & Stopochkina, I. (2025). GRAPH-BASED ANALYSIS OF INFORMATION FLOWS IN TELEGRAM FOR CYBERSECURITY THREAT DETECTION. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(27), 368–380. https://doi.org/10.28925/2663-4023.2025.27.746