METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR

Authors

DOI:

https://doi.org/10.28925/2663-4023.2021.14.3649

Keywords:

clustering coefficient; social network; flow; information; data; leakage; coefficient; equation

Abstract

A mathematical model has been developed and a study of the model of personal data protection from network clustering coefficient and data transfer intensity in social networks has been carried out.

Dependencies of protection of the system from the size of the system (and from the amount of personal data); information security threats from the network clustering factor.

A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, change of information protection from network clustering factor, its size, personal data protection.

As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network from different components are obtained.

Considering three options for solving the equation near the steady state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a certain value is carried out periodically, with decaying amplitude, or by exponentially decaying law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system existence.

Mathematical and graphical dependences of the system natural frequency, oscillation period, attenuation coefficient are presented.

Simulation modeling for values with deviation from the stationary position of the system is carried out. As a result of simulation, it is proved that the social network protection system is nonlinear.

Downloads

Download data is not yet available.

References

Akhramovich, V., Hrebennikov, A., Tsarenko, B., Stefurak, O. (2021). Method of calculating the protection of personal data from the reputation of users. Sciences of Europe, 1(80), 23-31.

Bailey, N. (2014) The Mathematical Theory of Infectious Diseases and Its Applications. Hafner Press, 1(405), 159–170.

Cohen, F. (1987). Computer viruses, theory and experiments. Computers & Security, 6, 22-35.

Gubanov, D., Chkhartishvili, A. (2013). A conceptual approach to the analysis of online social networks. Upravlenie bol'shimi sistemami – Large-Scale Systems Control, 45, 222−236 (In Russian).

Kephart, J. O., & White, S. R. (б. д.). Directed-graph epidemiological models of computer viruses. У 1991 IEEE Computer Society Symposium on Research in Security and Privacy. IEEE Comput. Soc. Press. https://doi.org/10.1109/risp.1991.130801

Laptiev, O., Savchenko, V., Kotenko, A., Akhramovych, V., Samosyuk, V., Shuklin, G., Biehun, A. Method of Determining Trust and Protection of Personal Data in Social Networks. International Journal of Communication Networks and Information Security, 1, 15-21.

The Model of Secure Social Networks Activity Based on Graph Theory. (2020). International Journal of Innovative Technology and Exploring Engineering, 9(4), 1803–1810. https://doi.org/10.35940/ijitee.d1768.029420

Rohloff, K. R., & Basar, T. (2005). Stochastic behavior of random constant scanning worms. У 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005. IEEE. https://doi.org/10.1109/icccn.2005.1523881

Savchenko, V. (2020). Analysis of Social Network Parameters and the Likelihood of its Construction. International Journal of Emerging Trends in Engineering Research, 8(2), 271–276. https://doi.org/10.30534/ijeter/2020/05822020

Williamson, Matthew M.; Laeveillae, J. (2003). Epidemiological model of virus spread and cleanup. Hewlett-Packard Laboratories Bristol. http://www.hpl.hp.com/techreports/2003/HPL-2003-39.pdf

Zan, Y., Wu, J., Li, P., & Yu, Q. (2014). SICR rumor spreading model in complex networks: Counterattack and self-resistance. Physica A: Statistical Mechanics and its Applications, 405, 159–170. https://doi.org/10.1016/j.physa.2014.03.021

Zhang, Y., & Zhu, J. (2018). Stability analysis of I2S2R rumor spreading model in complex networks. Physica A: Statistical Mechanics and its Applications, 503, 862–881. https://doi.org/10.1016/j.physa.2018.02.087

Zhao, N., Cheng, X., & Guo, X. (2018). Impact of information spread and investment behavior on the diffusion of internet investment products. Physica A: Statistical Mechanics and its Applications, 512, 427–436. https://doi.org/10.1016/j.physa.2018.08.075

Akhramovych, V.M. (2019). Model sylnykh ta slabkykh zviazkiv korystuvachiv v sotsialnykh merezhakh. Zviazok, 3, 8–12.

Savchenko, V. A., Akhramovych, V. M., Dziuba, T. M., Laptiev, S. O., Matviienko, M. V. (2021). Metod rozrakhunku zakhystu informatsii vid vzaiemovplyvu korystuvachiv v sotsialnykh merezhakh. Suchasnyi zakhyst informatsii, 1, 6-13.

Trubetskov, D.Y. (2004). Vvedenye v synerhetyku. Khaos y strukturы. Yzd. 2–e yspr. Y dop.– M. Edytoryal. URSS.

Downloads


Abstract views: 226

Published

2021-12-30

How to Cite

Akhramovich, V. (2021). METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(14), 36–49. https://doi.org/10.28925/2663-4023.2021.14.3649