AN INFORMATION-SIGN MODEL OF THE SOURCE OF HARMFUL INFORMATION IN SOCIAL NETWORKS
DOI:
https://doi.org/10.31891/2219-9365-2022-71-3-8Keywords:
models, algorithms, malicious information model, social networks, countermeasures, message sourcesAbstract
The problem of detecting and countering the spread of harmful information has an insufficient number of scientific and technical solutions. The available means of combating and detecting harmful information in social networks do not meet the requirements for adequacy, speed, accuracy and completeness of the decisions made. This is due to the following reasons: the systems are divided into two unrelated modules - monitoring, countermeasures, between which the operator is located. It is necessary to process extremely large flows of messages in real time, implement countermeasures in a short period of time, in manual mode the operator is unable to stop the spread of malicious information in the social network.
The task of the research is to develop: models of harmful information, source and social network; algorithms for analyzing the sources of messages spreading harmful information in social networks and ranking countermeasures.
Solving the set tasks will allow: to improve the quality of decisions made in the process of detecting and countering harmful information; sort information objects of influence for the operator by priority; set the input data for the configuration of the system for detecting and countering the spread of malicious information in networks.
The information-sign model of malicious information in social networks allows you to generate data for detecting and countering the spread of malicious information in the network. The complex of models consists of a model of malicious information, an information-sign model of malicious information, a model of the source of information, a model of a social network. Each of the models contains unique attributes and relationships between information objects, as well as a set of models allows for the formation of appropriate requirements for algorithms for the evaluation and analysis of message sources and provides a choice of countermeasures.