A SYSTEM APPROACH TO ORGANISING PROTECTION FROM TARGETED INFORMATION IN SOCIAL NETWORKS
https://doi.org/10.21822/2073-6185-2017-44-1-103-115
Abstract
Abstract. Objectives The aim of the study is to formalise a generalised algorithm for the distribution of targeted information in social networks, serving as the basis for a methodology for increasing personal information security. Method The research is based on the methodology of protection from unwanted information distributed across social network systems. Results The article presents the formalisation of an algorithm for the distribution of targeted information across social networks: input and output parameters are defined and the algorithm’s internal conditions are described, consisting of parameters for implementing attack scenarios, which variation would allow them to be detailed. A technique for protection from targeted information distributed across social networks is proposed, allowing the level of protection of personal data and information of social networks users to be enhanced, as well as the reliability of information increased. Conclusion The results of the research will help to prevent threats to information security, counteract attacks by intruders who often use methods of competitive intelligence and social engineering through the use of countermeasures. A model for protection against targeted information and implement special software for its integration into online social network social information systems is developed. The system approach will allow external monitoring of events in social networks to be carried out and vulnerabilities identified in the mechanisms of instant messaging, which provide opportunities for attacks by intruders. The results of the research make it possible to apply a network approach to the study of informal communities, which are actively developing today, at a new level.
About the Author
Marina V. TumbinskayaRussian Federation
Cand. Sc.(Technical), Associate Prof. of Information Security Systems
10 Karl Marx Str., Kazan 420111
References
1. Levtsov V., Demidov N. Anatomiya targetirovannoy ataki . Sistemnyy administrator. [Elektronnyy resurs] – http://samag.ru/archive/article/3170 [Data obrashcheniya: 06.03.2017]. [Levtsov V., Demidov N. Anatomy of the targeted attack. System Administrator. [Electronic resource] – http://samag.ru/archive/article/3170 [Acces date: 06.03.2017]. (in Russ.)]
2. Markelova A.V., Kozyreva V.A., Smetanina O.N. Modeli upravleniya protsessom realizatsii akademicheskoy mobil'nosti v vuze. Vestnik Novosibirskogo gosudarstvennogo universiteta. Seriya: Informatsionnye tekhnologii. 2011; 9(2):55-65. [Markelova A.V., Kozyreva V.A., Smetanina O.N. Models of management of the process of academic mobility in the university. Novosibirsk State University Journal of Information Technologies. 2011; 9(2):55-65. (in Russ.)]
3. Yusupova N.I., Rizvanov D.A., Smetanina O.N., Enikeeva K.R. Modeli predstavleniya znaniy dlya podderzhki prinyatiya resheniy pri upravlenii slozhnymi sistemami v usloviyakh neopredelennosti i resursnykh ogranicheniy. Proceedings of the 4th International Conference ―Information Technologies for Intelligent Decision Making Support (ITIDS'2016)‖. Ufa; 2016. P. 24 – 27. [Yusupova N.I., Rizvanov D.A., Smetanina O.N., Enikeeva K.R. Knowledge representation models for decision support in managing complex systems under uncertainty and resource constraints. Proceedings of the 4th International Conference ―Information Technologies for Intelligent Decision Making Support (ITIDS'2016)‖. Ufa; 2016. P. 24 – 27. (in Russ.)]
4. Yusupova N.I., Smetanina O.N., Enikeeva K.R. Ierarkhicheskie situatsionnye modeli dlya SPPR v slozhnykh sistemakh. Sovremennye problemy nauki i obrazovaniya. 2013; 4:63-68. [Yusupova N.I., Smetanina O.N., Enikeeva K.R. Hierarchical situational models for DSS in complex systems. Modern problems of science and education. 2013; 4:63-68. (in Russ.)]
5. Yashnikov A.Yu., Bolodurina I.P. Vyyavlenie liderov mneniy sotsial'noy seti. Materialy XXXIV Studencheskoy mezhdunarodnoy zaochnoy nauchno-prakticheskoy konferentsii ―Molodezhnyy nauchnyy forum: tekhnicheskie i matematicheskie nauki‖. 2016; 5(34):59-65. [Yashnikov A.Yu., Bolodurina I.P. Identifying the opinion leaders of the social network. Proceedings of XXXIV Student international correspondence scientific-practical conference ―Molodezhnyy nauchnyy forum: tekhnicheskie i matematicheskie nauki‖. 2016; 5(34):59-65. (in Russ.)]
6. Mirzanurov D.H. Metodika zashchity ot nezhelatel'noy informatsii, rasprostranyaemoy v sistemakh SOCIAL NETWORK. Simvol nauki. 2015; 5:48-51. [Mirzanurov D.H. The method of protection against unwanted information distributed in SOCIAL NETWORK systems. Simvol nauki. 2015; 5:48-51. (in Russ.)]
7. Mirzanurov D.H. Metodika zashchity ot targetirovannoy informatsii, rasprostranyaemoy v sistemakh SOCIAL NETWORK. Privolzhskiy nauchnyy vestnik. 2015; 6-1(46): 40-43. [Mirzanurov D.H. The method of protection against the targeted information distributed in SOCIAL NETWORK systems. Privolzhskiy nauchnyy vestnik. 2015; 6-1(46): 40-43. (in Russ.)]
8. Tsarev E. Anatomiya ataki v sotsial'nykh setyakh ot Mayka Raggo [Elektronnyy resurs] – http://www.tsarev.biz/informacionnaya-bezopasnost/anatomiya-ataki-v-socialnyx-setyax-otmajka-raggo/ [Data obrashcheniya: 06.03.2017]. [Tsarev E. Anatomy of the attack in social networks from Mike Ruggo [Electronic resource] – http://www.tsarev.biz/informacionnayabezopasnost/anatomiya-ataki-v-socialnyx-setyax-ot-majka-raggo/ [access date: 06.03.2017]. (in Russ.)]
9. Sluzhba vneshney razvedki shturmuet sotsseti [Elektronnyy resurs] – http://www.rbc.ru/society/27/08/2012/5703fbef9a7947ac81a6b1cd [Data obrashcheniya: 06.03.2017]. [The Foreign Intelligence Service is storming the social network [Electronic resource] – http://www.rbc.ru/society/27/08/2012/5703fbef9a7947ac81a6b1cd [access date: 06.03.2017]. (in Russ.)]
10. Fedorov P. VKontakte operezhaet Instagram po chislu zaregistrirovannykh pol'zovateley [Elektronnyy resurs] – http://siliconrus.com/2014/01/vkontakte-operezhaet-instagram-po-chisluzaregistrirovannyih-polzovateley/ [Data obrashcheniya: 21.09.2016]. [Fedorov P. VKontakte ahead of Instagram by the number of registered users [Electronic resource] – http://siliconrus.com/2014/01/vkontakte-operezhaet-instagram-po-chislu-zaregistrirovannyihpolzovateley/ [access date: 21.09.2016]. (in Russ.)]
11. Yusupova N.I., Shakhmametova G.R. Integratsiya innovatsionnykh informatsionnykh tekhnologiy: teoriya i praktika. Vestnik Ufimskogo gosudarstvennogo aviatsionnogo tekhnicheskogo universiteta. 2010. 14-4(39):112-118. [Yusupova N.I., Shakhmametova G.R. Integration of innovative information technologies: theory and practice. Vestnik Ufimskogo gosudarstvennogo aviatsionnogo tekhnicheskogo universiteta. 2010. 14-4(39):112-118. (in Russ.)]
12. Nazarov A.N., Galushkin A.I., Sychev A.K. Risk-modeli i kriterii informatsionnogo protivoborstva v sotsial'nykh setyakh. T-Comm: Telekommunikatsii i transport. 2016; 10(7):81-86. [Nazarov A.N., Galushkin A.I., Sychev A.K. Risk-models and criteria of information confrontation in social networks. T-Comm. 2016; 10(7):81-86. (in Russ.)]
13. Doktrina informatsionnoy bezopasnosti Rossiyskoy Federatsii [Elektronnyy resurs] – http://www.rg.ru/oficial/doc/min_and_vedom/mim_bezop/doctr.shtm [Data obrashcheniya: 20.09.2016]. [The Doctrine of Information Security of the Russian Federation [Electronic resource] – http://www.rg.ru/oficial/doc/min_and_vedom/mim_bezop/doctr.shtm [access date: 20.09.2016]. (in Russ.)]
14. Tul’taeva I.V., Kaptyukhin R.V., Tul’taev T.A. Vozdeystvie sotsial'nykh setey na kommunikatsionnye protsessy v sovremennom obshchestve. Biznes. Obrazovanie. Pravo. Vestnik Volgogradskogo instituta biznesa. 2014; 4:84-88. [Tul’taeva I.V., Kaptyukhin R.V., Tul’taev T.A. The Impact of Social Networks on Communication Processes in Modern Society. Business. Education. Law. Bulletin of the Volgograd Business Institute. 2014; 4:84-88. (in Russ.)]
15. Murzin F.A., Batura T.V., Proskuryakov A.V. Programmnyy kompleks dlya analiza dannykh iz sotsial'nykh setey. Programmnye produkty i sistemy. 2015; 4:188-197. [Murzin F.A., Batura T.V., Proskuryakov A.V. A software package for analysing data from social networks. Programmnye produkty i sistemy. 2015; 4:188-197. (in Russ.)]
16. Maydykov A.A., Isarov O.B. Natsional'nye interesy - aktual'nye problemy protivodeystviya ispol'zovaniyu interneta terroristicheskimi i ekstremistskimi organizatsiyami. Natsional'nye interesy: prioritety i bezopasnost'. 2015; (323):44-51. [Maydykov A.A., Isarov O.B. National interests - topical issues of countering the use of the Internet by terrorist and extremist organizations. National interests: priorities and security. 2015; (323):44-51. (in Russ.)]
17. Eset: akkaunty sotssetey 60% pol'zovateley runeta vzlamyvalis' khakerami [Elektronnyy resurs] – http://www.securitylab.ru/news/442581.php [Data obrashcheniya: 21.09.2016]. [Eset: accounts of social networks 60% of users of runet hacked by hackers [Electronic resource] – http://www.securitylab.ru/news/442581.php [access date: 21.09.2016]. (in Russ.)]
18. Korshunov A. Analiz dannykh pol'zovateley sotsial'nykh setey [Elektronnyy resurs] – http://synthesis.ipi.ac.ru/sigmod/seminar/korshunov20130530.pdf [Data obrashcheniya: 06.03.2017]. [Korshunov A. Analysis of data from users of social networks [Electronic resource] – http://synthesis.ipi.ac.ru/sigmod/seminar/korshunov20130530.pdf [access date: 06.03.2017]. (in Russ.)]
19. Kremnev D. Prodvizhenie v sotsial'nykh setyakh. [Elektronnyy resurs] – http://owlweb.ru/wpcontent/uploads/2015/10/21681337d0ac6c287594c8fc8b5bb733.pdf [Data obrashcheniya: 06.03.2017]. [Kremnev D. Promotion in social networks. [Electronic resource] – http://owlweb.ru/wp-content/uploads/2015/10/21681337d0ac6c287594c8fc8b5bb733.pdf [access date: 06.03.2017]. (in Russ.)]
20. Korshunov A., Beloborodov I., Buzun N., Avanesov V., Pastukhov R., Chikhradze K., Kozlov I., Gomzin A., Andrianov I., Sysoev A., Ipatov S., Filonenko I., Chuprina K., Turdakov D., Kuznetsov S. Analiz sotsial'nykh setey: metody i prilozheniya. [Korshunov A., Beloborodov I., Buzun N., Avanesov V., Pastukhov R., Chikhradze K., Kozlov I., Gomzin A., Andrianov I., Sysoev A., Ipatov S., Filonenko I., Chuprina K., Turdakov D., Kuznetsov S. Analysis of social networks: methods and applications. [Electronic resource] – http://www.ispras.ru/proceedings/docs/2014/26/1/isp_26_2014_1_439.pdf [access date 06.03.2017]. (in Russ.)]
21. 15 samykh populyarnykh sotsial'nykh setey mira [Elektronnyy resurs] – https://ain.ua/2014/06/09/15-samyx-populyarnyx-socialnyx-setej-mira [Data obrashcheniya: 06.03.2017]. [15 most popular social networks in the world [Electronic resource] – https://ain.ua/2014/06/09/15-samyx-populyarnyx-socialnyx-setej-mira [access date: 06.03.2017]. (in Russ.)]
Review
For citations:
Tumbinskaya M.V. A SYSTEM APPROACH TO ORGANISING PROTECTION FROM TARGETED INFORMATION IN SOCIAL NETWORKS. Herald of Dagestan State Technical University. Technical Sciences. 2017;44(1):103-115. (In Russ.) https://doi.org/10.21822/2073-6185-2017-44-1-103-115