Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks

被引:2
作者
Kotenko, Igor [1 ]
Saenko, Igor [1 ]
Chechulin, Andrey [1 ,2 ]
Desnitsky, Vasily [1 ,2 ]
Vitkova, Lidia [1 ,2 ]
Pronoza, Anton [1 ]
机构
[1] Russian Acad Sci, St Petersburg Inst Informat & Automat, 39,14 Th Liniya, St Petersburg, Russia
[2] Bonch Bruevich St Petersburg State Univ Telecommu, St Petersburg, Russia
来源
SOCIAL INFORMATICS (SOCINFO 2018), PT II | 2018年 / 11186卷
基金
俄罗斯科学基金会;
关键词
Information security; Protection from information; Data mining; Social networks; Classifier; Information retrieval;
D O I
10.1007/978-3-030-01159-8_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper considers an interdisciplinary problem of protecting the information space of social networks from unwanted and malicious information. One of the means for solving this problem is the development of an integrated system for monitoring and counteraction to malicious influences in social networks. The architecture of this system is proposed. The architecture includes components for collection, preprocessing and storage of information objects, semantic analysis of malicious information objects, identifying sources of attack and target audiences, analyzing the distribution channels of malicious information objects, and complex recognition of the impact elements. The issues of implementation and functioning of the components of the proposed system are discussed. The experimental evaluation showed high efficiency of the accepted architectural solutions.
引用
收藏
页码:159 / 167
页数:9
相关论文
共 10 条
[1]  
[Anonymous], 2010, P 19 INT C WORLD WID, DOI DOI 10.1145/1772690.1772698
[2]   TiDE: Template-Independent Discourse Data Extraction [J].
Barua, Jayendra ;
Patel, Dhaval ;
Goyal, Vikram .
BIG DATA ANALYTICS AND KNOWLEDGE DISCOVERY, 2015, 9263 :149-162
[3]   Home location profiling for users in social media [J].
Chen, Jinpeng ;
Liu, Yu ;
Zou, Ming .
INFORMATION & MANAGEMENT, 2016, 53 (01) :135-143
[4]  
Gubanov DA, 2010, SOCIAL NETWORKS MODE
[5]  
Jurgens D., 2013, ICWSM, V7, P273, DOI [10.1609/icwsm.v7i1 .14399, DOI 10.1609/ICWSM.V7I1.14399]
[6]  
Kao Huan-An, 2010, LREC, P1113
[7]  
Kotenko I, 2017, INT J INTERNET PROTO, V10, P61, DOI 10.1504/IJIPT.2017.10003851
[8]  
Kotenko I, 2014, LECT NOTES ARTIF INT, V8557, P39, DOI 10.1007/978-3-319-08976-8_4
[9]  
Sadilek A., 2012, P 6 INT C WEBL SOC M
[10]  
[Трофимович Ю.С. Trofimovich Y.S.], 2016, [Труды Института системного программирования РАН, Trudy Instituta sistemnogo programmirovaniya RAN], V28, P185, DOI 10.15514/ISPRAS-2016-28(6)-13