METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR
DOI:
https://doi.org/10.28925/2663-4023.2021.14.3649Keywords:
clustering coefficient; social network; flow; information; data; leakage; coefficient; equationAbstract
A mathematical model has been developed and a study of the model of personal data protection from network clustering coefficient and data transfer intensity in social networks has been carried out.
Dependencies of protection of the system from the size of the system (and from the amount of personal data); information security threats from the network clustering factor.
A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, change of information protection from network clustering factor, its size, personal data protection.
As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network from different components are obtained.
Considering three options for solving the equation near the steady state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a certain value is carried out periodically, with decaying amplitude, or by exponentially decaying law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system existence.
Mathematical and graphical dependences of the system natural frequency, oscillation period, attenuation coefficient are presented.
Simulation modeling for values with deviation from the stationary position of the system is carried out. As a result of simulation, it is proved that the social network protection system is nonlinear.
Downloads
References
Akhramovich, V., Hrebennikov, A., Tsarenko, B., Stefurak, O. (2021). Method of calculating the protection of personal data from the reputation of users. Sciences of Europe, 1(80), 23-31.
Bailey, N. (2014) The Mathematical Theory of Infectious Diseases and Its Applications. Hafner Press, 1(405), 159–170.
Cohen, F. (1987). Computer viruses, theory and experiments. Computers & Security, 6, 22-35.
Gubanov, D., Chkhartishvili, A. (2013). A conceptual approach to the analysis of online social networks. Upravlenie bol'shimi sistemami – Large-Scale Systems Control, 45, 222−236 (In Russian).
Kephart, J. O., & White, S. R. (б. д.). Directed-graph epidemiological models of computer viruses. У 1991 IEEE Computer Society Symposium on Research in Security and Privacy. IEEE Comput. Soc. Press. https://doi.org/10.1109/risp.1991.130801
Laptiev, O., Savchenko, V., Kotenko, A., Akhramovych, V., Samosyuk, V., Shuklin, G., Biehun, A. Method of Determining Trust and Protection of Personal Data in Social Networks. International Journal of Communication Networks and Information Security, 1, 15-21.
The Model of Secure Social Networks Activity Based on Graph Theory. (2020). International Journal of Innovative Technology and Exploring Engineering, 9(4), 1803–1810. https://doi.org/10.35940/ijitee.d1768.029420
Rohloff, K. R., & Basar, T. (2005). Stochastic behavior of random constant scanning worms. У 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005. IEEE. https://doi.org/10.1109/icccn.2005.1523881
Savchenko, V. (2020). Analysis of Social Network Parameters and the Likelihood of its Construction. International Journal of Emerging Trends in Engineering Research, 8(2), 271–276. https://doi.org/10.30534/ijeter/2020/05822020
Williamson, Matthew M.; Laeveillae, J. (2003). Epidemiological model of virus spread and cleanup. Hewlett-Packard Laboratories Bristol. http://www.hpl.hp.com/techreports/2003/HPL-2003-39.pdf
Zan, Y., Wu, J., Li, P., & Yu, Q. (2014). SICR rumor spreading model in complex networks: Counterattack and self-resistance. Physica A: Statistical Mechanics and its Applications, 405, 159–170. https://doi.org/10.1016/j.physa.2014.03.021
Zhang, Y., & Zhu, J. (2018). Stability analysis of I2S2R rumor spreading model in complex networks. Physica A: Statistical Mechanics and its Applications, 503, 862–881. https://doi.org/10.1016/j.physa.2018.02.087
Zhao, N., Cheng, X., & Guo, X. (2018). Impact of information spread and investment behavior on the diffusion of internet investment products. Physica A: Statistical Mechanics and its Applications, 512, 427–436. https://doi.org/10.1016/j.physa.2018.08.075
Akhramovych, V.M. (2019). Model sylnykh ta slabkykh zviazkiv korystuvachiv v sotsialnykh merezhakh. Zviazok, 3, 8–12.
Savchenko, V. A., Akhramovych, V. M., Dziuba, T. M., Laptiev, S. O., Matviienko, M. V. (2021). Metod rozrakhunku zakhystu informatsii vid vzaiemovplyvu korystuvachiv v sotsialnykh merezhakh. Suchasnyi zakhyst informatsii, 1, 6-13.
Trubetskov, D.Y. (2004). Vvedenye v synerhetyku. Khaos y strukturы. Yzd. 2–e yspr. Y dop.– M. Edytoryal. URSS.