Construction Features and Analysis of Warfare Information Model with Impulse Perturbations under Poisson Approximation Conditions Ihor Samoilenkoa, Anatolii Nikitinb,c, Ganna Verowkinaa, and Tetiana Nikitinad a Taras Shevchenko National University of Kyiv, 60 Volodymyrska str., Kyiv, 01033, Ukraine b National University of Life and Environmental Science, 15 Heroiv Oborony str., Kyiv, 03041, Ukraine c Jan Kochanowski University of Kielce, 5 Zeromskiego str., Kielce, 25-369, Poland d Dmytro Motornyi Tavria State Agrotechnological University, 18b Khmelnytsky ave., Melitopol, 32312, Ukraine Abstract We study a continuous model that describes the conflict interaction for two complex systems. External conflict interaction is modeled by the additional influence of chanc e. The dynamics of internal conflict are similar to the Lotka-Volterra model. We interpret the new model of information warfare as the influence of rare events that rapidly change certain ideas of a large number of people. As a result, the number of supporters of different ideas makes stochastic jumps that we can see using the Poison approximation scheme. We suggest that such a model could be more natural, as important news now has a quick and powerful impact on audiences through television and the Internet. Keywords 1 Random evolution, information warfare model, Markov switch, Lotka-Volterra equations, Poison approximation scheme 1. Introduction The information warfare models with an additional interaction between them may be interpreted as some kind of correlation between the habitants of different regions. In general, the Lotka-Volterra model of prey-predator interaction is one of the main models for simulation of similar processes in applied mathematics, social sciences, and economics [3], [8โ€“11], [17]. Application of this approach to the information warfare model was proposed in [4]. Authors regard some social community of quantity ๐‘0 , potentially exposed some information threat of two types, that is, for example, the threat of a negative change in its state by transmitting some information relevant to this group by information two different channels. The values ๐‘1 (๐‘ก), ๐‘2 (๐‘ก) are the numbers of โ€œadherentsโ€ depending on time ๐‘ก who accepted the new information, ideas, norms, etc. of type 1 and 2 respectively. These are the main current characteristics of the degree of prevalence of information threats. We propose some results where the generator of the limit process is constructed in explicit form. We also give some interpretations of our model. 2. Classical Information Warfare Model The main model assumptions are: 1. Both information threats are distributed among the community through the two information channels: Cybersecurity Providing in Information and Telecommunication Systems, January 28, 2021, Kyiv, Ukraine EMAIL: isamoil@i.ua (A.1); nikitin2505@univ.kiev.ua (B.2); avv@univ.kiev.ua (A.3); nikitina0217@gmail.com (D.4) ORCID: 0000-0001-6858-8224 (A.1); 0000-0001-5137-0114 (B.2); โ€” (A.3); 0000-0002-6091-0597 (D.4) ยฉ๏ธ 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) 12 ๏‚ท The first one is โ€œexternalโ€ in relation to the community, for example, advertising media campaigns. Its intensity is characterized by the parameters ๐›ผ1 > 0 and ๐›ผ2 > 0 respectively, both are considered to be independent of time. ๏‚ท The second, โ€œinternalโ€ channel is interpersonal communication between members of the social community (its intensity, that is, the number of equivalent informational contacts, characterized by the parameters ๐›ฝ1 > 0 and ๐›ฝ2 > 0 respectively, that are also independent of time). As a result, the adherents of the first idea that has been already โ€œrecruitedโ€ (their number is equal to ๐‘1 (๐‘ก)), make their contribution to the recruitment process by affecting non-recruited members (their number is equal to the value of ๐‘0 โˆ’ ๐‘1 (๐‘ก) โˆ’ ๐‘2 (๐‘ก). The same is for the adherents of the second idea. 2. The rate of change of the number of adherents ๐‘1 (๐‘ก) and ๐‘2 (๐‘ก) (that is, the number recruited into the unit time) consists of: ๏‚ท External recruitment rate (it is proportional to the product of the intensities ๐›ผ1 and ๐›ผ2 and on the number of individuals who are not yet recruited ๐‘0 โˆ’ ๐‘1 (๐‘ก) โˆ’ ๐‘2 (๐‘ก)), that is, ๐›ผ1 (๐‘0 โˆ’ ๐‘1 (๐‘ก) โˆ’ ๐‘2 (๐‘ก)) and ๐›ผ2 (๐‘0 โˆ’ ๐‘1 (๐‘ก) โˆ’ ๐‘2 (๐‘ก)) respectively. ๏‚ท Internal recruitment rate (it is proportional to the product of intensities ๐›ฝ1 and ๐›ฝ2 , on the corresponding number of active adherents ๐‘1 (๐‘ก), ๐‘2 (๐‘ก) and on the number of non-recruited ๐‘0 โˆ’ ๐‘1 (๐‘ก) โˆ’ ๐‘2 (๐‘ก)), that is, ๐›ฝ1 ๐‘1 (๐‘ก)(๐‘ โˆ’ ๐‘1 (๐‘ก) โˆ’ ๐‘2 (๐‘ก)) and ๐›ฝ2 ๐‘2 (๐‘ก)(๐‘ โˆ’ ๐‘1 (๐‘ก) โˆ’ ๐‘2 (๐‘ก)) respectively. 0 0 Consequently, the model is described by Lotka-Volterra-type equations [4]: ๐‘‘๐‘1 (๐‘ก)/๐‘‘๐‘ก = (๐›ผ1 + ๐›ฝ1 ๐‘1 (๐‘ก))(๐‘0 โˆ’ ๐‘1 (๐‘ก) โˆ’ ๐‘2 (๐‘ก)), ๐‘‘๐‘2 (๐‘ก)/๐‘‘๐‘ก = (๐›ผ2 + ๐›ฝ2 ๐‘2 (๐‘ก))(๐‘0 โˆ’ ๐‘1 (๐‘ก) โˆ’ ๐‘2 (๐‘ก)), ๐‘ก > 0. 3. Information warfare model with impulsive influence As we know, the outside world speaks with us the language of probability theory, so the deterministic model is only part of the real situation. That is why we are building a model that describes a model of information warfare that has not yet been explored, that is, a model based on contingencies, and contingencies of different types: ๐‘‘๐‘ ๐œ€ (๐‘ก) = ๐ถ(๐‘ ๐œ€ (๐‘ก), ๐‘ฅ(๐‘ก/๐œ€ 2 ))๐‘‘๐‘ก + ๐‘‘๐œ‚ ๐œ€ (๐‘ก), (1) where ๐‘ก ๐ถ (๐‘ ๐œ€ (๐‘ก), ๐‘ฅ ( 2 )) = ๐œ€ โˆ’๐›ผ1 (๐‘ฅ) + ๐›ฝ1 (๐‘ฅ)๐‘0 (๐‘ฅ) โˆ’ ๐›ฝ2 (๐‘ฅ)๐‘1๐œ€ (๐‘ก) โˆ’๐›ผ1 (๐‘ฅ) โˆ’ ๐›ฝ1 (๐‘ฅ)๐‘1๐œ€ (๐‘ก) ๐‘ ๐œ€ (๐‘ก) =( ๐œ€ ๐œ€ ) ( 1๐œ€ ), (2) โˆ’๐›ผ2 (๐‘ฅ) โˆ’ ๐›ฝ2 (๐‘ฅ)๐‘2 (๐‘ก) โˆ’๐›ผ2 (๐‘ฅ) + ๐›ฝ2 (๐‘ฅ)๐‘0 (๐‘ฅ) โˆ’ ๐›ฝ1 (๐‘ฅ)๐‘2 (๐‘ก) ๐‘2 (๐‘ก) ๐œ€ ๐œ€ is a small series parameter; ๐‘ (๐‘ก) is a two-dimensional vector of solutions, components of which are the quantities of the adherents of different ideas; ๐‘ฅ(๐‘ก/๐œ€ 2 ) is uniformly ergodic Markov process in standard phase space (๐‘‹, ๐‘ฟ), is defined by the generator [1], [2], [6], [13] ๐‘ธ๐œ‘(๐‘ฅ) = ๐‘ž(๐‘ฅ) โˆซ ๐‘ƒ(๐‘ฅ, ๐‘‘๐‘ฆ)[๐œ‘(๐‘ฆ) โˆ’ ๐œ‘(๐‘ฅ)] ๐‘‹ on the Banach space ๐ต(๐‘‹) of real-valued bounded functions ๏ช ( x) with the supremum norm ||๐œ‘|| = max|๐œ‘(๐‘ฅ)|. ๐‘ฅโˆˆ๐‘‹ The stochastic kernel ๐‘ƒ(๐‘ฅ, ๐ต), ๐‘ฅ โˆˆ ๐‘‹, ๐ต โˆˆ ๐‘ฟ, uniformly ergodic embedded Markov chain ๐‘ฅ๐‘› = ๐‘ฅ(๐œ๐‘› ), ๐‘› โ‰ฅ 0, with stationary distribution ๐œŒ(๐ต), ๐ต โˆˆ ๐‘ฟ. Stationary distribution ๐œ‹(๐ต), B ๏ƒŽ X , of the Markov process ๐‘ฅ(๐‘ก), ๐‘ก โ‰ฅ 0 is defined by the relation ๐œ‹(๐‘‘๐‘ฅ)๐‘ž(๐‘ฅ) = ๐‘ž๐œŒ(๐‘‘๐‘ฅ), where 13 ๐‘ž = โˆซ ๐œ‹(๐‘‘๐‘ฅ)๐‘ž(๐‘ฅ). ๐‘‹ Denote by ๐‘…0 the potential operator of the generator ๐‘ธ, which is defined by the equality ๐‘…0 = ๐›ฑ โˆ’ (๐›ฑ + ๐‘ธ)โˆ’1, where ๐›ฑ๐œ‘(๐‘ฅ) = โˆซ๐‘‹ ๐œ‹(๐‘‘๐‘ฆ)๐œ‘(๐‘ฆ) ๐Ÿ(๐‘ฅ) is the projector of zeroes of generator ๐‘ธ onto the subspace ๐‘๐‘„ = {๐œ‘: ๐‘ธ๐œ‘ = 0}; ๐œ‚ ๐œ€ (๐‘ก) is the impulse perturbation process [1], [5], [6], [7], [16] defined by the relation ๐‘ก ๐‘  ๐œ‚ ๐œ€ (๐‘ก) = โˆซ ๐œ‚ ๐œ€ (๐‘‘๐‘ , ๐‘ฅ ( 2 )), 0 ๐œ€ where the family of processes with independent increments ๐œž๐œ€ (๐‘ฅ)๐œ‘(๐œ”) = ๐œ€ โˆ’2 โˆซ (๐œ‘(๐œ” + ๐‘ฃ) โˆ’ ๐œ‘(๐œ”)) ๐›ค ๐œ€ (๐‘‘ ๐‘ฃ, ๐‘ฅ), ๐‘ฅ โˆˆ ๐‘‹ ๐‘… and satisfies the properties of Poisson approximation; P1. The approximation of averages โˆซ๐‘… ๐‘ฃ๐›ค ๐œ€ (๐‘‘๐‘ฃ, ๐‘ฅ) = ๐œ€(๐‘Ž(๐‘ฅ) + ๐œƒ๐‘Ž (๐‘ฅ)), ๐œƒ๐‘Ž (๐‘ฅ) โ†’ 0, ๐œ€ โ†’ 0, and โˆซ๐‘… ๐‘ฃ 2 ๐›ค ๐œ€ (๐‘‘ ๐‘ฃ, ๐‘ฅ) = ๐œ€ 2 (๐‘(๐‘ฅ) + ๐œƒ๐‘ (๐‘ฅ)), ๐œƒ๐‘ (๐‘ฅ) โ†’ 0, ๐œ€ โ†’ 0. P2. The condition imposed on the distribution function โˆซ๐‘… ๐‘”(๐‘ฃ) ๐›ค ๐œ€ (๐‘‘ ๐‘ฃ, ๐‘ฅ) = ๐œ€ 2 (๐›ค๐‘” (๐‘ฅ) + ๐œƒ๐‘” (๐‘ฅ)), ๐œƒ๐‘” (๐‘ฅ) โ†’ 0, ๐œ€ โ†’ 0 for all g (v) ๏ƒŽ C3 ( R) , and C3 ( R) is the space of real-valued bounded functions such that ๐‘”(๐‘ฃ) /| ๐‘ฃ |2 โ†’ 0, | ๐‘ฃ | โ†’ 0, where measure ๏‡ g ( x) is bounded for all g (v) ๏ƒŽ C3 ( R) and is defined by the relation (functions from the space C3 ( R) separate the measures): ๐›ค๐‘” (๐‘ฅ) = โˆซ๐‘… ๐‘”(๐‘ฃ)๐›ค0 (๐‘‘๐‘ฃ, ๐‘ฅ), ๐‘”(๐‘ฃ) โˆˆ ๐ถ3 (๐‘…). P3. The uniform quadratic integrability lim โˆซ ๐‘ฃ 2 ๐›ค0 (๐‘‘ ๐‘ฃ, ๐‘ฅ) = 0. ๐‘โ†’โˆž | ๐‘ฃ |>๐‘ ะ 4: Absence of diffusion component ๐‘(๐‘ฅ) = โˆซ๐‘… ๐‘ฃ 2 ๐›ค0 (๐‘‘๐‘ฃ, ๐‘ฅ). We give a simple example of a random variable ๐œ‰ that satisfies the conditions of the Poisson approximation: ๐‘ƒ{๐œ‰ = ๐‘} = ๐œ€๐‘, ๐‘ƒ{๐œ‰ = ๐œ€๐‘Ž} = 1 โˆ’ ๐œ€๐‘. The relations for the moments of this random variable are as follows: ๐ธ ๐œ‰ = ๐œ€(๐‘Ž + ๐‘๐‘) + ๐‘œ(๐œ€), ๐ธ ๐œ‰ 2 = ๐œ€(๐‘ 2 ๐‘) + ๐‘œ(๐œ€). 14 4. Asymptotic analysis of the model Firstly, we consider the asymptotic properties of the perturbation process. Theorem 1. Under conditions P1 โ€“ P4, weak convergence ๐œ‚ ๐œ€ (๐‘ก) โ†’ ๐œ‚ 0 (๐‘ก), ๐œ€ โ†’ 0. holds true for the impulse perturbation process. The limit process ๐œ‚ 0 (๐‘ก) is defined by the generator ๐›ค๐œ‘(๐‘ค) = ๐‘Žฬ‚๐œ‘โ€ฒ(๐‘ค) + โˆซ๐‘…[๐œ‘(๐‘ค + ๐‘ฃ) โˆ’ ๐œ‘(๐‘ฃ)]๐›คฬ‚0 (๐‘‘๐‘ฃ), where ๐‘Žฬ‚ = โˆซ ๐œ‹ (๐‘‘๐‘ฅ)๐‘Ž(๐‘ฅ), ๐‘‹ ๐›คฬ‚0 (๐‘ฃ) = โˆซ ๐œ‹ (๐‘‘๐‘ฅ)๐›ค0 (๐‘ฃ, ๐‘ฅ). ๐‘‹ Thus, we deal in a limit with a random process, which has deterministic drift and Poisson jumping component. Further, we investigate the asymptotic properties of the original evolutionary system (1), in particular, using the approaches proposed in [14], [15]. Theorem 2. If conditions P1 โ€“ P4 are satisfied, the weak convergence in the sense of generators convergence (๐‘ข๐œ€ (๐‘ก), ๐œ‚ ๐œ€ (๐‘ก)) โ†’ (๐‘ข0 (๐‘ก), ๐œ‚ 0 (๐‘ก)), ๐œ€ โ†’ 0. holds true. The limiting coupled process is defined by the generator ๐‘ณ๐œ‘(๐‘ค, ๐‘ฃ) = ๐ถฬ‚ (๐‘ข)๐œ‘โ€ฒ (๐‘ค,โˆ™) + ๐›ค๐‘ค ๐œ‘(๐‘ค,โˆ™), where generator ๐›ค๐‘ค are the same as defined in Theorem 1, but acting on argument ๐‘ค of the vector- function ๐œ‘(๐‘ค, ๐‘ฃ), corresponding to a coupled process. The averaged function has a form ๐ถฬ‚ (๐‘ข) = โˆซ ๐œ‹(๐‘‘๐‘ฅ)๐ถ(๐‘ข, ๐‘ฅ). ๐‘‹ The last correlation means that to obtain the limit characteristics that describe the information warfare model, all the functions in (2) that depend on x should be averaged by the stationary measure of the switching Markov process. 5. Investigation methods and results We apply the approaches to the construction and analysis of complex systems proposed in the works of Korolyuk V.S. [1], [2] and his followers, in particular, we apply the following scheme: 1. Construction of the generator of the Markov additive process. 2. Asymptotic form of the generator acting on some special type of test functions. 3. Solving of a singular perturbation problem on test functions in a form ๐œ‘๐œ€ (๐‘ข, ๐‘ค, ๐‘ฃ) = ๐œ‘(๐‘ข, ๐‘ค) + ๐œ€๐œ‘1 (๐‘ข, ๐‘ค, ๐‘ฃ) + ๐œ€ 2 ๐œ‘2 (๐‘ข, ๐‘ค, ๐‘ฃ). The following resumes should be made: 1. The weak convergence of the processes ๐‘ข๐œ€ (๐‘ก) โ‡’ ๐‘ข0 (๐‘ก), ๏ฅ ๏‚ฎ 0 . follows from the convergence of respective generators when compactness of the prelimiting set of processes ๐‘ข๐œ€ (๐‘ก) holds true. Weak convergence of stochastic processes is usually proved by checking the two conditions: tightness of the distributions of the converging processes which ensures the existence of a converging subsequence and uniqueness of the weak limit. The passage to the limit can be done on the semigroups which correspond to the converging processes as well as on appropriate generators. While proving convergence of generators a natural question arises concerning the uniqueness of a limit semigroup. It can be answered by representing the process in focus as a unique solution to a martingale problem which is formulated with the help of the limit generator. 15 2. The limit process ๐‘ข0 (๐‘ก) can be given by stochastic differential equation ๐‘‘๐‘ขฬ‚(๐‘ก) = [๐ถฬ‚ (๐‘ขฬ‚(๐‘ก)) + ๐‘Žฬ‚]๐‘‘๐‘ก + โˆซ๐‘… ๐‘ฃ๐œˆฬƒ (๐‘‘๐‘ก, ๐‘‘ ๐‘ฃ), where ๐‘ฌ๐œˆฬƒ(๐‘‘๐‘ก, ๐‘‘๐‘ฃ) = ๐‘‘๐‘ก๐›คฬƒ0 (๐‘‘๐‘ฃ). 0 3. The limit process ๐‘ข (๐‘ก) has two components. The deterministic drift is defined by the solution of the differential equation ๐‘‘๐‘ขฬ‚๐‘‘ (๐‘ก) = [๐ถฬ‚ (๐‘ขฬ‚๐‘‘ (๐‘ก)) + ๐‘Žฬ‚]๐‘‘๐‘ก, where the additional term ๐‘Žฬ‚ appears due to accumulation with the normalized time ๐‘ก/๐œ€ 2 , ๐œ€ โ†’ 0 of small jumps of the impulse process that happen with probability, close to one. The second component is rare big jumps that take place with nearly zero probability and are defined in terms of an averaged measure of jumps ๐›คฬƒ0 (๐‘‘๐‘ฃ) by the generator ฮ“๐œ‘(๐‘ค) = โˆซ [๐œ‘(๐‘ค + ๐‘ฃ) โˆ’ ๐œ‘(๐‘ค) โˆ’ ๐‘ฃ๐œ‘โ€ฒ(๐‘ค)]๐›คฬƒ0 (๐‘‘๐‘ฃ) ๐‘… 6. Conclusions The following results of our investigation were obtained: ๏‚ท A model that is more general than the classical one was proposed. ๏‚ท The limit generator of the dynamical system was constructed. ๏‚ท The behavior of the limit process in terms of its components was analyzed. 7. Interpretation As we can see in many works on mathematical biology and economics the modeling of population dynamics or economical processes is based on Lotka-Volterra type equations. We propose a new model of information warfare with an additional influence of chance. That may be interpreted as some kind of rare event that rapidly changes some beliefs of large quantities of people. As a result, the quantities of adherents of different ideas make stochastic jumps, which we may see applying the Poisson approximation scheme. We suppose that such a model could be more essential, as soon as now breaking news produce a quick and astonishing influence on the audience through TV and Internet. The behavior of our model could not be analyzed obviously for any fixed moment as it was done in a classical case. But, as it is usual for stochastic models, we may obtain functional limit theorems that present the behavior on large time intervals. Thus, we have averaged limit characteristics of the process and may use them to construct obvious solutions. We hope to obtain recommendations for prevalence strategies in information warfare fights in the future. 8. References [1] V. S. Korolyuk, N. Limnios, Stochastic Systems in Merging Phase Space, World Scienti๏ฌc, 2005. [2] V. S. Korolyuk, N. Limnios, I. V. Samoilenko, Lรฉvy and Poisson approximations of switched stochastic systems by a semimartingale approach, Comptes Rendus Mathรฉmatique 354 (2016) 723โ€“728. [3] A. J. Lotka, Relation between birth rates and death rates, Science 26 (1907) 21โ€“22. doi:10.1126/science.26.653.21-a. [4] ะ. P. Mikhailov, N. A. Marevtseva, Models of information warfare. Mathematical Models and Computer Simulations 4 (2012) 251โ€“259. doi:10.1134/S2070048212030076. [5] I. V. Samoilenko, A. V. Nikitin, Differential Equations with Small Stochastic Terms Under the Lรฉvy Approximating Conditions. Ukrainian Mathematical Journal 69 (2018) 1445โ€“1454. doi:10.1007/s11253-018-1443-x. 16 [6] A.V. Nikitin, Asymptotic Dissipativity of Stochastic Processes with Impulsive Perturbation in the Levy Approximation Scheme, JAI(S) 50 (2018). doi:10.1615/JAutomatInfScien.v50.i4.50. [7] Y. M. Chabanyuk, A.V. Nikitin, U. T. Khimka, Asymptotic properties of the impulse perturbation process under Levy approximation conditions with the point of equilibrium of the quality criterion, Matematychni Studii 52 (2019). doi:10.30970/ms.52.1.96-104. [8] L. Stone, R. Olinky, Phenomena in ecological systems, in: Experimental Chaos: 6th Experimental Chaos Conference, 2003, pp. 476โ€“487. [9] K. I. Takahashi, K. Salam, M. Md., Mathematical model of conflict with non-annihilating multi- opponent, J. Interdisciplinary Math 9 (2006) 459โ€“473. doi:10.1080/09720502.2006.10700457. [10] J. Tufto, Effects of releasing maladapted individuals: a demographic evolutionary model, The American Naturalist 158 (2001) 331โ€“340. doi:10.1086/321987. [11] P. P. Verhulst, Notice sur la loi que la population suit dans son accroissement, Correspondence mathematique et physique publiee par A. Quetelet 10 (1838) 113โ€“121. [12] V. Volterra, Sui tentativi di applicazione della matematiche alle scienze biologiche e sociali, Giornale degli Economisti 23 (1901) 436โ€“458. [13] A.V. Nikitin, Asymptotic Properties of a Stochastic Diffusion Transfer Process with an Equilibrium Point of a Quality Criterion, Cybernetics and System analysis 51 (2015) 650โ€“656. doi:10.1007/s10559-015-9756-3. [14] M. B. Nevelson, R. Z. Khas'minskii, Stochastic approximation and recursive estimation, Moscow, 1972. [15] G. Papanicolaou, D. Stroock, S.R.S. Varadhan, Martingale approach to some limit theorems, in: Duke turbulence conference, Durham, NC, April 23-25, 1976, Duke University Mathematics Series III, New York, 1977, 120 p. [16] I. V. Samoilenko, A. V. Nikitin, B. V. Dovhai, Asymptotic Dissipativity for Merged Stochastic Evolutionary Systems with Markov Switchings and Impulse Perturbations under Conditions of Lรฉvy Approximation, Cybernetics and System analysis 56 (2020) 392โ€“400. doi:10.1007/s10559- 020-00255-4. [17] Zh. Hu, V. Buriachok, V. Sokolov, Implementation of Social Engineering Attack at Institution of Higher Education, in: 1th International Workshop on Cyber Hygiene & Conflict Management in Global Information Networks, Kyiv, Ukraine, 2020. doi:10.5281/zenodo.3994103 17