=Paper= {{Paper |id=Vol-3200/paper4 |storemode=property |title=Method of Calculation of Information Protection from Clusterization Ratio in Social Networks |pdfUrl=https://ceur-ws.org/Vol-3200/paper4.pdf |volume=Vol-3200 |authors=Vitalii Savchenko,Volodymyr Akhramovych,Oleksander Matsko,Ivan Havryliuk }} ==Method of Calculation of Information Protection from Clusterization Ratio in Social Networks== https://ceur-ws.org/Vol-3200/paper4.pdf
Method of Calculation of Information Protection from
Clusterization Ratio in Social Networks
Vitalii Savchenko 1, Volodymyr Akhramovych 2, Oleksander Matsko3 and Ivan Havryliuk 4
1,2
   State University of Telecommunications, Solomianska str.7, Kyiv, 03110, Ukraine
3,4
   The National Defense University of Ukraine named after Ivan Cherniakhovskyi, Povitroflotsky av. 28, Kyiv,
    03049, Ukraine

                  Abstract
                  The article investigates the dynamic models of the information protection system in social
                  networks taking into account the clustering coefficient, and also analyzes the stability of the
                  protection system. In graph theory, the clustering factor is a measure of the degree to which
                  nodes in a graph tend to group together. The available data suggest that in most real networks,
                  and in particular in social networks, nodes tend to form closely related groups with a relatively
                  high density of connections; this probability is greater than the average probability of a random
                  connection between two nodes.
                  There are two variants of this term: global and local. The global version was created for a
                  general idea of network clustering, while the local one describes the nesting of individual nodes.
                  There is a practical interest in studying the behavior of the system of protection of social
                  networks from the value of the clustering factor. Dynamic systems of information protection in
                  social networks in the mathematical sense of this term are considered. A dynamic system is
                  understood as any object or process for which the concept of state as a set of some quantities at
                  a given moment of time is unambiguously defined and a given law is described that describes
                  the change (evolution) of the initial state over time. This law allows the initial state to predict
                  the future state of a dynamic system. It is called the law of evolution.
                  The study is based on the nonlinearity of the social network protection system. To solve the
                  system of nonlinear equations used: the method of exceptions, the joint solution of the
                  corresponding homogeneous characteristic equation. Since the differential of the protection
                  function has a positive value in some data domains (the requirement of Lyapunov's theorem for
                  this domain is not fulfilled), an additional study of the stability of the protection system within
                  the operating parameters is required. Phase portraits of the data protection system in MatLab /
                  Multisim are determined, which indicate the stability of the protection system in the operating
                  range of parameters even at the maximum value of influences.

                  Keywords 1
                  dynamic models, information protection system, social networks, clustering coefficient,
                  nonlinearity, exception method, homogeneous characteristic equation, function differential,
                  system stability, phase portrait


1. Introduction                                                                              also various: with the help of differential
                                                                                             equations, discrete mappings, graph theory,
                                                                                             Markov chain theory, and so on. The choice of
   Descriptions of dynamical systems for various
                                                                                             one of the methods of description determines the
problems depending on the law of evolution are

III International Scientific And Practical Conference “Information
Security And Information Technologies”, September 13–19, 2021,
Odesa, Ukraine
EMAIL: savitan@ukr.net; 12z@ukr.net; macko2006@ukr.net;
ivan.havryliuk@gmail.com
ORCID: 0000-0002-3014-131X (A.1); 0000-0000-0002-6174-
5300 (A. 2); 0000-0003-3415-3358 (A. 3); 0000-0002-3514-0738
(A. 4)
              © 2021 Copyright for this paper by its authors. Use permitted under Creative
              Commons License Attribution 4.0 International (CC BY 4.0).

              CEUR Workshop Proceedings (CEUR-WS.org)
specific form of the mathematical model of the            coefficient for complex networks. In [14], it was
corresponding dynamic system [3].                         concluded that based on the results of the
    The mathematical model of a dynamic system            experiment, it can be concluded that among the
is considered to be given if the parameters               clustering algorithms there is no universal
(coordinates) of the system are introduced, which         algorithm that would be significantly ahead of
unambiguously determine its state, and the law of         others on all data sets. The leaders of
evolution is specified. Depending on the degree of        benchmarking are the algorithms Spinglass and
approximation to the same system, different               Walktrap. From the considered analysis of the
mathematical models can be matched.                       works, it can be concluded that currently the
    Theoretical study of the dynamic behavior of a        protection of users in social networks is
real object requires the creation of its                  considered primarily as a technical problem that
mathematical model. In many cases, the                    does not take into account the structural
procedure for developing a model is to compile            parameters of the network and its topological
mathematical equations based on physical laws.            features. This emphasizes the relevance of the
Usually these laws are formulated in the language         topic of work regarding the construction of a
of differential equations. As a result, the               protection system based on structural parameters,
coordinates of the state of the system and its            taking into account network clustering.
parameters are interconnected, which allows us to
begin to solve differential equations under               3. Formulation of the research task
different initial conditions and parameters.
                                                              It is necessary to investigate the dynamic
2. Related works                                          system of information protection in the social
                                                          network (SN) from the clustering factor. Carry out
    In the article [1] the definition of the clustering   modeling of a nonlinear protection system taking
coefficient in the case of (binary and weighted)          into account the clustering factor in SN.
directional networks is extended and the expected         Investigate the stability of the protection system
value for random graphs is calculated. In [2], it is      in the SN.
noted that the properties of the small world of
neighboring connections are higher than in                4. Main part
comparative random networks. If a node has one
or no neighbors, in such cases the local clustering       4.1. Nonlinear solution of the
is traditionally set to zero, and this value affects           protection system in the SN,
the global clustering factor. It is proposed to                taking into account the action of
include the coefficient θ for isolated nodes in
order to estimate the clustering coefficient, except           a specific parameter ‐ the
in cases from the determination of Watts and                   clustering factor
Strogats. In [3] a method of determining trust and
protection of personal data in social networks was           Analysis of graphical dependences of a linear
developed. In article [4-6] the clustering                system [3] indicates the nonlinearity of the
coefficients for social networks, including power         system. Therefore, in the system of equations (1)
ones, are considered. In [7], a comparison of             we introduce nonlinear components (2):
different generalizations of the clustering
coefficient and local efficiency for weighted
                                                                   dI
undirected graphs is made. In the article [8] the                   Z p Z  ( Cv  С K ) I
analysis of the clustering coefficient on the social               dt
                                                                              C
network twitter is carried out. In [9], an analysis                dZ   ( vV v 1 )  I ( C                (1)
                                                                   dt                         d 2  Cd 1 )
of the clustering coefficient through triads of                               N2
connections was performed. In the article [10] the
dependence between the clustering coefficient
                                                          where:  Cv1 - the total number of connections
and the average path length in a social network is                vV
investigated. In [11,13] the use of clustering            in the network, N - the number of vertices in the
methods of social networks for personalization of         network.
educational content is investigated. The article
[12,15] discusses the behavior of the clustering
                                                                   We obtain a system of equations:
                                                                 
                                                                 dI Z Z( C С ) I L ( I 2Sin2t )
                                                                  dt p         v K        2 0
                                                                          3   3
                                                                  L3 ( I0 Sin t )...
                                                                            Cv1
                                                                 dZ        
                                                                  (
                                                                           v V    )I ( Cd 2Cd1)К2 ( Z02Sin2t )
                                                                  dt        N 2                                    (3)
                                                                  K ( Z 3Sin3t )...
                                                                  3 0
Figure 1: Differential of the clustering coefficient
function                                                            Let's rewrite the system and present it as
                                                                follows:
                                                                                          
dI                            2        3                               dI   Z   I   L I k sin k  t ,
 dt Z pZ (Cv СK ) I L2 ( I )L3 ( I )...                          dt           1        k 0
                                                                                         k 2
          Cv1                                                        
                                                          (2)           dZ               
dZ ( vV      )I (Cd 2 Cd1)К2 ( Z 2 )K3 ( Z3 )...                                         k    k               (4)
 dt          2                                                         dt   2 I     K k Z 0 sin  t ,
           N                                                                           k 2

where: L2 , L3 , etc. K 2 , K3 , etc. some linear               where:
operators. We consider the nonlinearity of the                                                                       Cv1
system to be weak, which allows us to find a
solution for each equation of the system (2) by the
                                                                                                        
                                                                  Z p , 1  Cv  CK , 2   Cd 2 Cd1 ,   (
                                                                                                                   vV
                                                                                                                     N2
                                                                                                                          )

method of successive approximation, putting:                       Next, use the exception method:
                  I  I1  I 2  I3 ...
                                                                     dZ               
                                                                          2 I     K k Z0k sin k t 
                                                                     dt              k 2

                                                                            1  dZ                        
                                                                     I                K k Z0k sin k t  
                                                                            2  dt                         
                                                                                       k 2                
                                                                  dI 1  d 2 Z 1                         
                                                                      2   kKk Z0k sink 1 t cost   (5)
                                                                  dt 2  dt    k 2                     


  Figure 2: Differential of protection function

   Since the differential of the protection function
has a positive value in some data domains (the
requirement of Lyapunov's theorem for this
domain is not fulfilled), an additional study of the
stability of the protection system within the
operating parameters is required

                  Z  Z1  Z2  Z3  ...

   Let at

                  dI                   dZ
       dI  0 ,       0, and dZ  0 ,    0
                  dt                   dt
              I  I 0 Sin t , Z  Z0 Sin t
Figure3: Graphs by dependence (4)
                                                           Figure 4: Graphs by dependence (5)
    Substitute all the found expressions (5) in the
first equation of system (4):

             1  d2Z 1                       
        
            2  dt2 
                      k2
                                              
                       kKkZ0k sink1t cost  
                                               
                                               

                    1  dZ                 
             Z           K Zk sink t  
                    2  dt      k 0         
                            k2             
                   
                   Lk I 0k sin k  t               (6)
                  k 2


or:

                d 2Z      dZ
                   2  1     2Z 
                dt        dt

             1 
                    
                 kK Z k sink 1t cost 
              k 2 k 0                        
                        
             1  1  Kk Z0k sink t 
                      k 2
                    
                2  Lk I 0k sin k  t
                   k 2                              (7)
                                                           Figure 5: Graphs by dependence (7)

                                                              Now we find a common solution of the
                                                           corresponding homogeneous equation:


                                                                       Z   1Z   2 Z  0           (8)

                                                               The characteristic equation has the form:
                                                            2  1   2  0 . Consider the case of the
                                                           positive discriminant of this equation:
                                                                2                      1  12  4 2
                                                           D  1  4 2  0  1,2                     (9)
                                                                                              2
      From:
                                  1  12  4 2
                                                           t
                                                                        1  12  4 2
                                                                                                          t
                                                                                                                         Given (13,14,15) we have:
         Z одн (t )  c1e                     2
                                                                c2 e                     2

                                                                                                                                                                             1 1242
                                                                                                                                                    1 12 42                            t
joint solution of a homogeneous equation.                                                                                                                          t         e         2
                                                                                                                               Z(t)  (N(t) e           2
                                                                                                                                                                                                  )dt 
   To find the general solution of the                                                                                                                                       12  42
inhomogeneous equation we use the method of
                                                                                                                                                                   1 12 42
variation of arbitrary constants:                                                                                                           1 12 42                         t
                                                                                                                                                           t   e         2
                                                                                                                                 N(t)  e      2
                                                                                                                                                                                       )dt,
                                  1  12  42                                  1  12  42                                                             t12  42
                                                       t                                                      t                                                                                           (16)
       Zодн (t )  c1 (t )e                   2
                                                                c2 (t )e                         2




where: c1 (t ), c2 (t ) are from the system:

        
                    1 12 42              1 12 42
                                  t                            t
        c1 (t )e         2         c2 (t )e       2           0,
                                            2
                                   1 1 42
                 1 12 42                      t
         c1 (t )                e           2         
                         2
                                      1 12 42
                           2
           1 1 42
                                                        t
            c   ( t )               e          2         N(t ),
          2                2
         
         

where:




                                                                                                                  (11)

      From equations (10, 11) we obtain:

                      1  12  4 2                            1  12  4 2
                                          t                                                       t
          c1 (t )e          2
                                                c2 (t )e                    2
                                                                                                      
                                                                                                                         Figure 6: Graphs by dependence (16)
                                                 
                     1 1242    24 
                                 t  1   1    2 
                           2             2         N(t )
           c2 (t)e                                                                                                     3.2. Define the phase portrait of the
                                      24                                                                  (12)
                                    1 1       2 
                                   
                                         2
                                                  
                                                  
                                                                                                                         data protection system
or:
                       1  12 42
                                                                                                                            Initial equation:
                                          t
           c2 (t)e           2
                                                42  N(t)
                                                  1
                                                   2
                                                                                                                  (13)
                                                                                                                          d2Z                     1 
where will we get:                                                                                                        dt2
                                                                                                                               
                                                                                                                                   dZ
                                                                                                                                 1 dt  2 Z  
                                                                                                                                                   k 2 k 0   
                                                                                                                                                      kK Zk sink1t cost                       
                                                                                                                                                                                                        (17)
                                                                1 12 42                                           1  1  Kk Z0k sink t  2  Lk I0k sink t
                                      1                                               t                                           k2                   k2
          c2 (t) 
                              4
                              2      N(t)e                            2
                                                                                          dt                      (14)
                              1               2
                                                                                                                            The solution will be implemented in the
                                                                  1  12  42
                                  1                                                           t                          program MatLab / Multisim. Let's make the
         c1 (t ) 
                         12  42
                                                   N (t )e                2
                                                                                                  dt              (15)
                                                                                                                         scheme (Fig. 7).
   The phase portrait is presented in the form of      The results of the program are presented in
an ellipse, which indicates the stability of the    Fig. 8, 9.
personal data protection system.




Figure 7: Block diagram of the phase portrait program in the Multisim program, taking into account
the attack block




                                                    Figure 10: Harmonic oscillations of the
Figure 8: Harmonic oscillations of the protection   protection system on time Z=f(t) taking into
system on time Z=f(t)                               account the attacks




Figure 9: Phase portrait of the protection system
on clustering factor
                                                         [3] O. Laptiev, V. Savchenko, A. Kotenko, V.
                                                              Akhramovych, V. Samosyuk, G. Shuklin,
                                                              A. Biehun. Method of Determining Trust and
                                                              Protection of Personal Data in Social
                                                              Networks.      International    Journal     of
                                                              Communication Networks and Information
                                                              Security (IJCNIS) 2021. №. 1, April 2021.
                                                              Рр. 15-21.
                                                         [4] V. Savchenko, V. Akhramovych, A.
                                                              Tushych, I. Sribna, I. Vlasov. Analysis of
                                                              Social Network Parameters and the
Figure 11: Phase portrait of the protection                   Likelihood of its Construction. International
system on clustering factor taking into account               Journal of Emerging Trends in Engineering
                                                              Research (IJETER). ISSN: 2347 – 3983, Vol.
the attacks
                                                              8. No. 2, February 2020. рр. 271 – 276.
                                                         [5] P. Shchypanskyi, V. Savchenko, V.
5. Analysis of the obtained results                           Akhramovych,        T.    Muzshanova,        S.
                                                              Lehominova, V. Chegrenets. The Model of
   In contrast to previous research by scientists, it         Secure Social Networks Activity Based on
has been proven that the SN protection system is              Graph Theory. International Journal of
stable even from external maximum influences                  Innovative Technology and Exploring
and a specific parameter of the clustering                    Engineering (IJITEE). ISSN: 2278–3075,
coefficient in the operating range of parameters.             Vol. 9. Issue 4, February 2020, рp. 1803 –
                                                              1810.
6. Conclusions                                           [6] Serhii Yevseiev, Oleksandr Laptiev, Sergii
                                                              Lazarenko, Anna Korchenko, Іryna
   For the first time in the article the dynamic              Manzhul. Modeling the protection of
model of the information protection system in                 personal data from trust and the amount of
social networks is investigated taking into account           information on social networks. Number 1
the clustering coefficient, and also the analysis of          (2021),      «EUREKA:         Physics      and
the stability of the protection system is carried out.        Engineering»                        pp.24–31.
A nonlinear equation of information protection is             DOI:10.21303/2461-4262.2021.001615
obtained. It is shown that the protection index          [7] Yui Van, Eshvar Humare, Rik Vandenberhe,
changes depending on the clustering coefficient.              Patrik Diupon (2017). Comparison of
Phase portraits of the protection system are                  various generalizations of clustering
obtained, which indicate the resistance of the                coefficient and local efficiency for weighted
system to external influences and the clustering              undirected graphs. Neural computing. 29 (2):
coefficient in SN.                                            313–331. doi : 10.1162 / NECO_a_00914 .
                                                              Retrieved 8 August 2020.
7. References                                            [8] М. Gracheva, Y. Iakobi, V. Stepanenko, Y.
                                                              Luneva. Analysis of the characteristics of
[1] Giorgio Fagiolo. Clustering in complex                    social graphs built according to the data of
    directed networks. Phys Rev E Stat Nonlin                 the       social       network         Twitter.
    Soft Matter Phys. . 2007 Aug;76(2 Pt                      gramar_98.98@mail.ru.
    2):026107.                               doi:        [9] I. Evin. Introduction to the theory of complex
    10.1103/PhysRevE.76.026107. Epub 2007                     networks. Computer research and modeling.
    Aug 16.                                                   2010 Т. 2 № 2 P. 121–141.
[2] Marcus Kaiser (2008). Mean clustering                [10] S. Yevseiev, V. Ponomarenko, O. Laptiev,
    coefficients: the role of isolated nodes and              O. Milov and others. Synergy of building
    leafs on clustering measures for small-world              cybersecurity systems: monograph / Edited
    networks. New Journal of Physics 10 (8):                  by–     Kharkiv:     PC      TECHNOLOGY
    083042.      Bibcode:2008NJPh...10h3042K.                 CENTER, 2021. – 188 p.
    arXiv:0802.2512.           doi:10.1088/1367-         [11] H. Mamedova, F. Agaev, L. Zeinalova.
    2630/10/8/083042.                                         Using social media to personalize e-learning.
     İnformasiya texnologiyaları problemlәri,
     2019, №1, 27–34.
[12] J. Pavlov, I. Chepliukova. On the
     asymptotics of the power structure of
     configuration graphs with constraints on the
     number of edges. Discrete Math, 2018. Т. 30.
     Issue. 1. P. 77–94.
[13] V. Starodubtsev. Personalization of the
     virtual       educational       environment.
     Pedagogical Education in Russia, 2015, №7,
     p.24–29.
[14] М. Firsov. Benchmarking graph clustering
     algorithms for decision-making problems.
     Basic research. – 2017. – № 12 (part 1) – С.
     138-142.
[15] J. Pavlov. On the asymptotics of the cluster
     coefficient of a configuration graph with an
     unknown distribution of vertex degrees.
     Information and its application, 2019, T 13,
     issue 3, 9–13.