+7 925 966 4690, 9am6pm (GMT+3), Monday – Friday
ИД «Финансы и кредит»

JOURNALS

  

FOR AUTHORS

  

SUBSCRIBE

    
National Interests: Priorities and Security
 

A generic algorithm of dissemination of targeted information in social networks

Vol. 13, Iss. 3, MARCH 2017

PDF  Article PDF Version

Received: 28 September 2016

Received in revised form: 10 November 2016

Accepted: 30 November 2016

Available online: 29 March 2017

Subject Heading: THREATS AND SECURITY

JEL Classification: C63

Pages: 584-600

https://doi.org/10.24891/ni.13.3.584

Tumbinskaya M.V. Kazan National Research Technical University n.a. A.N. Tupolev – KAI, Kazan, Republic of Tatarstan, Russian Federation
tumbinskaya@inbox.ru

Importance Social networks provide massive information about users, the so called open data mining. The social network users voluntarily disclose their personal information to abusers, mentioning their work, education, interests through pages and groups, which they join, and notes they make there. Thus important data become available for abusers who organize network attacks against users through targeted information.
Objectives The research overviews current issues of information security in social networks, especially the protection of targeted information aimed at preserving the integrity of confidential information.
Methods The research relies upon the algorithm used to disseminate targeted information throughout social networks, determines its parameters, which, if varied, would help specify various scenarios of attacks. The article sets forth threats to information security in social networks and proposes protection methods.
Results If scenarios are specified and detailed, they will allow for counteraction measures. The method of protection from targeted information disseminated throughout social networks allows to devise anti-targeted information model and implement special-purpose software to integrate it into social systems of social networks.
Conclusions and Relevance The article evaluates whether the anti-targeted information methods are effectively applied. The proposed solutions will allow countering data mining through modern protection methods and tools and guidelines for integrity of information resources.

Keywords: information security, social system, social networks, targeted information, abuser, attack scenario

References:

  1. Tul'taeva I.V., Kaptyukhin R.V., Tul'taev T.A. [An impact of social networks on communication processes in contemporary society]. Biznes. Obrazovanie. Pravo. Vestnik Volgogradskogo instituta biznesa = Business. Education. Law. Bulletin of the Volgograd Business Institute, 2014, no. 4, pp. 84–88. (In Russ.)
  2. Markelova A.V., Kozyreva V.A., Smetanina O.N. [Models for running the academic mobility process in higher schools]. Vestnik Novosibirskogo gosudarstvennogo universiteta. Seriya Informatsionnye tekhnologii = Novosibirsk State University Journal of Information Technologies, 2011, no. 2, pp. 55–65. (In Russ.)
  3. Murzin F.A., Batura T.V., Proskuryakov A.V. [Software package for analyzing social network data]. Programmnye produkty i sistemy, 2015, no. 4, pp. 188–197. (In Russ.) doi: 10.15827/0236-235X.112.188-197
  4. Yusupova N.I., Rizvanov D.A., Smetanina O.N., Enikeeva K.R. [Knowledge representation models to support decision making in management of complex systems under uncertainty and restricted resources]. Information Technologies for Intelligent Decision Making Support ITIDS'2016: materialy mezhdunarodnoi konferentsii [Proc. Int. Sci. Conf. Information Technologies for Intelligent Decision Making Support ITIDS'2016]. Ufa, Ufa State Aviation Technical University Publ., 2016, pp. 24–27.
  5. Yusupova N.I., Smetanina O.N., Enikeeva K.R. [Hierarchical situation models for DSS in complex systems]. Sovremennye problemy nauki i obrazovaniya, 2013, no. 4, pp. 63–68. (In Russ.) Available at: Link.
  6. Nazarov A.N., Galushkin A.I., Sychev A.K. Risk models and criteria of information confrontation in social networks. T-Comm: Telekommunikatsii i transport = T-Comm – Telecommunications and Transportation, 2016, no. 7, pp. 81–86. (In Russ.)
  7. Mirzanurov D.Kh. [Security policy against targeted information propagated in social network systems]. Privolzhskii nauchnyi vestnik = Volga Scientific Bulletin, 2015, no. 6-1, pp. 40–43. (In Russ.)
  8. Smetanina O.N., Maksimenko Z.V., Klimova A.V. Models of education quality estimation based on fuzzy classification. Vestnik Ufimskogo gosudarstvennogo aviatsionnogo tekhnicheskogo universiteta = Vestnik UGATU, 2013, no. 6, pp. 53–56. (In Russ.)
  9. Yusupova N.I., Shakhmametova G.R. [Integration of innovative information technologies: theory and practice]. Vestnik Ufimskogo gosudarstvennogo aviatsionnogo tekhnicheskogo universiteta = Vestnik UGATU, 2010, no. 4, pp. 112–118. (In Russ.)

View all articles of issue

 

ISSN 2311-875X (Online)
ISSN 2073-2872 (Print)

Journal current issue

Vol. 20, Iss. 3
March 2024

Archive