<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Models of the threat of virus idea dissemination in information‐ telecommunication networks  </article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dmitriy Moiseev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vera Miryanova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Sevastopol state university</institution>
          ,
          <addr-line>33 Universitetskaya str., Sevastopol, 299053</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>175</fpage>
      <lpage>180</lpage>
      <abstract>
        <p>   The work is devoted to solving the problems associated with the spread of viruses and ideas in the field of research on the processes of reintegration of post-conflict societies. As you know, information and telecommunication networks currently include all kinds of means of switching subscribers, the most common and popular are social networks, which in fact provide an almost complete set of opportunities for exchanging multimedia information between users. The virus must be aware that some «information networks” and “are instantly perceived by active participants in social networks». Effective protection of subscribers from the threat of spreading the virus idea is a serious problem, especially for the development and reintegration of post-conflict societies, since the modern Internet provides not only mobilization and technological opportunities, but also has an informational and psychological impact on individual and mass consciousness. The virus idea, in turn, should be understood as a certain information message, which is often "thrown in" by the media and instantly picked up by the active part of social network subscribers.</p>
      </abstract>
      <kwd-group>
        <kwd> 1  resources unmanned vehicles</kwd>
        <kwd>detection of vulnerabilities</kwd>
        <kwd>information criterion</kwd>
        <kwd>statistical distance</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction </title>
      <p>As you know, information and telecommunications networks, at the moment, include all kinds of
means of switching subscribers, the most common and popular are social networks, which actually
provide almost a complete set of opportunities for exchanging multimedia information between users
(subscribers). In the second decade of the XXI century, there are a huge number of different social
networks in the world, from which you can distinguish some of their prevalence depending on the
country or region, so in the Russian Federation today the most popular are «vk.com», «ok.ru»,
«my.mail.ru», in USA there are «Facebook», «MySpace», «Twitter» and «LinkedIn»; «Nexopia» — in
Canada, «Bebo» — in Great Britain, «Facebook», «dol2day» — in Germany. The current problem of
such networks, as you know, is their low level of information security.</p>
      <p>The virus idea, in turn, should be understood as a certain information message, which is often
"thrown in" by the media and instantly picked up by the active part of social network subscribers.</p>
      <p>When analyzing the information flows of the socio-media environment, it is necessary to base on
the network theories set forth in the works of M. Granovetter, M. Castels, P. Lazarsfeld, J. Moreno, as
well as the ideas of E. Toffler about information and communication technologies as a factor of
sociopolitical changes. It becomes possible to use modern information technologies of agent - based
modeling and big data processing to study the processes of deliberate organization of collective actions
of a socio-political nature that form value-semantic guidelines and attitudes of Internet users.</p>
      <p>When considering issues related to modeling processes occurring in information and
telecommunications networks, the main approach is to use models of influence, information
management and confrontation (see Figure 1:).</p>
      <sec id="sec-1-1">
        <title>Models of influence</title>
      </sec>
      <sec id="sec-1-2">
        <title>Optimization and simulation models</title>
      </sec>
      <sec id="sec-1-3">
        <title>Models with thresholds</title>
      </sec>
      <sec id="sec-1-4">
        <title>Independent cascade models</title>
      </sec>
      <sec id="sec-1-5">
        <title>Ising model</title>
      </sec>
      <sec id="sec-1-6">
        <title>Models based on cellular automata</title>
      </sec>
      <sec id="sec-1-7">
        <title>Models of infiltration and infection</title>
      </sec>
      <sec id="sec-1-8">
        <title>Models based on Markov chains</title>
      </sec>
      <sec id="sec-1-9">
        <title>Game-theoretic models</title>
      </sec>
      <sec id="sec-1-10">
        <title>Models of mutual awareness</title>
      </sec>
      <sec id="sec-1-11">
        <title>Models of coordinated collective action</title>
      </sec>
      <sec id="sec-1-12">
        <title>Models of communication</title>
      </sec>
      <sec id="sec-1-13">
        <title>Network stability models</title>
      </sec>
      <sec id="sec-1-14">
        <title>Information influence and management models</title>
      </sec>
      <sec id="sec-1-15">
        <title>Models of information confrontation</title>
        <p>
          As you know, intrusion detection systems (IDS) are one of the mandatory components of the social
network security infrastructure [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. A special role in the protection of social networks is played by the
creation of preventive protection systems.
        </p>
        <p>
          Currently, signature intrusion detection methods are being actively developed (intrusion detection
methods based on signatures - templates of typical attacks created based on the headers or contents of
network packets [
          <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6">3-6</xref>
          ]. And behavioral methods are based not on models of information attacks, but on
models of "normal" functioning [
          <xref ref-type="bibr" rid="ref10 ref11 ref7 ref8 ref9">7-11</xref>
          ].
        </p>
        <p>
          Working with insights, identifying them, classifying them, and determining the best ways to use
them should be done using an interdisciplinary approach that synthesizes statistical, mathematical, and
programming methods [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. The "preprocessing" stage involves identifying the main features and
factors, compressing the dimensions of the data multistructure, and other preparatory calculations,
including checking the data for quality and the presence of rough outliers. At this stage it is assumed to
use the principal component and multidimensional scaling methods. At the stage of "data analysis",
hidden insights are supposed to be identified by the mutual correlation (quantitative and qualitative) of
the user's characteristics of the media environment [
          <xref ref-type="bibr" rid="ref13 ref14">13-14</xref>
          ]. To do this, we plan to use the canonical
correlation method. Factor analysis allows you to determine the dominant factors that have the main
contribution to the variance of a multidimensional data array. An important part of the study will be
clustering the data set in a multidimensional feature space. For this purpose, non-hierarchical ones will
be used (k-medium, k-medoids, etc..) and hierarchical methods of cluster analysis.
        </p>
        <p>For various information occasions, the analysis of the level of radicality of messages for different
social groups, depending on the number of messages, was carried out (Figure 2:).</p>
        <p>In general, the trend of the level of radicality shows a positive trend in the intensity of messages,
regardless of belonging to a particular social group and the nature of the messages. At the same time, it
should be noted that the level of radical positive messages has less volatility (Figure 3:).</p>
        <p>At the "postprocessing"stage, it is supposed to filter the main "patterns" of features, visualize and
interpret the obtained groups or classes of features that determine the main hidden patterns in the data
(insights). At the "Analytics" stage, it is supposed to work with insights and determine the most optimal
ways to use them. The purpose of this stage is to determine the type of patterns and cause-and-effect
relationships between sets of signs of social media activity. To do this, we will use the method of
multivariate linear regression, including the use of generalized linear models. Also, at this stage it is
planned to develop discriminating rules for the selection of signs of insights of a particular type
identified at the previous stage. The established rules can also be represented as a decision tree or
regression tree, which is widely used in machine learning and data mining and is a means of predicting
user targets based on a set of social media activity characteristics.</p>
        <p>For a group of "chronological" data, it is planned to use special methods for the diagnosis and
forecast of time series. In particular, such analysis should be based on an objective division of series
into trend, quasi-periodic and stochastic ("noise") components. Often the deterministic components of
a series are masked by a "noise" component and manifest themselves through the autocorrelated
structure of the series. The selection and analysis of such components should be carried out using
different methods. The project proposes to use a new method of empirical decomposition of time series
into a finite number of orthogonal irregular components - the EMD method. The EMD method does not
depend on a strictly defined basis of decomposition functions (Fourier analysis) or on the need for
preliminary determination of the parent wavelet (wavelet analysis), which, in fact, is more applicable
for a time series with a regular structure. The method has a high degree of localization in the time
domain of the decomposition and allows you to effectively isolate the trend component, quasi-periodic
and noise components from non-stationary irregular time series. Using the EMD method will allow you
to build a significantly better model of the analyzed time series. The model of trend and quasiperiodic
components can serve as polynomials of different degrees and periodic functions, while the model of
the stochastic component should be based on autoregression of time series residuals after removing the
deterministic components.</p>
        <p>The critical point for scripting is the method by which this work can be done. The most obvious,
effective and optimal method from the point of view of the subsequent computer algorithmization of
the scenario is the decision tree method and other combinational methods based on the basic
"trees"method.</p>
        <p>When building trees, the "divide and conquer" strategy is used, which is as follows. In the nodes,
starting from the root, the attribute is selected, the value of which is used to divide all the data into 2
classes. The process continues until the stop criterion is met, which is possible in the following
situations:
 All (or almost all) data of a given node belongs to the same class.
 There are no signs left on which to build a new partition.
 The tree has exceeded the preset "growth limit".</p>
        <p>The decision tree grows while there is still the possibility of constructing new partitions. There may
be a situation where the groups are too small and there are too many branch points. In this case, the
model is referred to as overridden. It can be inconvenient to use such decision trees in practice. In this
case, some reasonable compromise branching depth should be chosen.</p>
        <p>Figure 5: shows a decision tree based on an array of data from a 75% sample of 590 social media
user records.</p>
        <p>Figure 5: A decision tree for identifying abnormal records (users on the network) </p>
        <p>The most important parameters of the model are the intensity of incoming messages and the number
of reposts for an informational occasion. The adequacy of the developed model directly depends on the
"plausibility" of these values.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Conclusions  </title>
      <p>Data collection technologies for analyzing the socio-media environment of post-conflict societies
will be further developed, as well as big data analysis methods for identifying cause-and-effect
relationships in the reintegration processes of post-conflict societies.</p>
      <p>Methods of agent-based modeling of information and propaganda influence in post-conflict societies
using the Internet will be further developed, which will allow analyzing the structural dynamics of
reintegration processes in such societies.</p>
      <p>The scientific novelty of the research is as follows:
 development of agent-based modeling methods for social media analysis in post-conflict
societies;
 improving the use of big data methods to search for insights in social media analysis in
postconflict societies;
 development of scenarios for the development of political processes in post-conflict societies
using simulation.</p>
      <p>After analyzing the results of the conducted research, it can be concluded that the effectiveness of
the chosen strategy for organizing information management significantly depends on the current
situation and the selected values of the control parameters. On the one hand, the presented results
demonstrate the consistency of the results obtained, and on the other hand, they have the necessary
stochastic component. The non-triviality of the presented dependencies is visible, which, indirectly,
confirms the relevance of the problem being solved in the work.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Acknowledgements </title>
      <p>This work was carried out within the framework of an internal grant "Development of agent-based
modeling and big data methods for social media analysis in post-conflict societies (grant №28/06-31).</p>
    </sec>
    <sec id="sec-4">
      <title>4. References </title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Y. Y.</given-names>
            <surname>Tarasevich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. A.</given-names>
            <surname>Zelepukhin</surname>
          </string-name>
          ,
          <article-title>Academic network as an excitable environment</article-title>
          <source>Comp. research and modeling 7</source>
          (
          <year>2015</year>
          )
          <fpage>177</fpage>
          -
          <lpage>183</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Goldenberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Libai</surname>
          </string-name>
          , E. Muller,
          <article-title>Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth 2 (</article-title>
          <year>2001</year>
          )
          <fpage>11</fpage>
          -
          <lpage>34</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Md. F.</given-names>
            <surname>Dewan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Z.</given-names>
            <surname>Rahman</surname>
          </string-name>
          ,
          <string-name>
            <surname>Ch. M. Rahman</surname>
          </string-name>
          ,
          <article-title>Mining Complex Network Data for Adaptive Intrusion</article-title>
          , Moscow: BINOM,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Dasgupt</surname>
          </string-name>
          ,
          <source>Artificial Immune Systems and Their Applications</source>
          , Moscow - Fizmatlit,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Skatkov</surname>
          </string-name>
          , Information Technologies for Critical Infrastructures, Sevastopol: SNTU,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D. Y.</given-names>
            <surname>Yeung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <article-title>Host-Based Intrusion Detection Using Dynamic and Static Behavioral Models</article-title>
          ,
          <source>Journal of Pattern Recognition</source>
          <volume>36</volume>
          (
          <year>2003</year>
          )
          <fpage>229</fpage>
          -
          <lpage>243</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C. C.</given-names>
            <surname>Michael</surname>
          </string-name>
          , Ghosh Simple,
          <article-title>State-Based Approaches to Program-Based Anomaly Detection ACM</article-title>
          ,
          <source>Transactions on Information and System Security</source>
          <volume>3</volume>
          (
          <year>2002</year>
          )
          <fpage>341</fpage>
          -
          <lpage>349</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Abraham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <source>Hybrid Flexible Neural-Tree-Based Intrusion Detection Systems</source>
          ,
          <source>International Journal of Intelligent Systems</source>
          <volume>22</volume>
          (
          <year>2007</year>
          )
          <fpage>337</fpage>
          -
          <lpage>352</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>T.</given-names>
            <surname>Shon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Moon</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          <article-title>Hybrid Machine Learning Approach to Network Anomaly Detection</article-title>
          ,
          <source>Journal of Information Sciences</source>
          <volume>177</volume>
          (
          <year>2007</year>
          )
          <fpage>3799</fpage>
          -
          <lpage>3821</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Moiseev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Bryukhovetskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Skatkov</surname>
          </string-name>
          ,
          <article-title>Intelligent decision - making support on the level of encryption of information transmitted in the UMV information exchange channels</article-title>
          ,
          <source>IOP Conf. Ser.: Mater. Sci. Eng</source>
          .
          <volume>734</volume>
          <fpage>012086</fpage>
          (
          <year>2020</year>
          ). https://doi.org/10.1088/
          <fpage>1757</fpage>
          - 899X/734/1/012086.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Skatkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Bryukhovetskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Moiseev</surname>
          </string-name>
          ,
          <article-title>Adaptive vulnerability detection model for unmanned vehicles drugs based on artificial immune systems</article-title>
          ,
          <source>IOP Conference Series: Materials Science and Engineering 734</source>
          <volume>012028</volume>
          (
          <year>2020</year>
          ). DOI: iopscience.iop.org/article/10.1088/
          <fpage>1757</fpage>
          - 899X/734/1/012028.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>O.</given-names>
            <surname>Yarmak</surname>
          </string-name>
          , Online Surveys in Sociology: Opportunities, Drawbacks and Limitations,
          <source>11th International Conference on Computer Science and Information Technologies CSIT</source>
          <volume>4</volume>
          (
          <year>2017</year>
          )
          <fpage>476</fpage>
          -
          <lpage>477</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Skatkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bryukhovetskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          ,
          <article-title>Monitoring of qualitative changes of network traffic states based on the heteroscedasticity effect</article-title>
          ,
          <source>Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings, Baku</source>
          ,
          <volume>7991765</volume>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Skatkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Bryukhovetskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Moiseev</surname>
          </string-name>
          ,
          <article-title>Intelligent monitoring system for solving large-scale scientific problems in cloud computing environments</article-title>
          ,
          <source>Information and control systems 2(87)</source>
          (
          <year>2017</year>
          )
          <fpage>19</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>