OUTREACHES CONTENT TRACING TECHNIQUE FOR SOCIAL NETWORKING SERVICES
DOI:
https://doi.org/10.15588/1607-3274-2017-2-13Keywords:
Social networking services, cybersecurity, threats, text content, latent semantic indexing, semantic analysis, ontologyAbstract
Context. Today’s social networking services have turned into an efficient communication tool for the members of virtual communities termed actors. The high rate of content dissemination, transboundary interactions between the actors and the drives to group the latter up, could make the services efficient cyberwarfare against the person, society and country. Text content is the most frequently used means of communication between the actors of virtual communities. The actual theoretical and applied research, aimed at designing maintenance procedures for the national cybersecurity system, is to solve the problem of text content monitoring.
Objective. The research objective is to suggest and design a method for detecting outreaches by their content in the collection of text to solve the problem of efficient monitoring the social media.
Method. The method designed is based on the modern content analysis approaches, i. e. the latent semantic indexing and the semantic analysis based on ontology.
Results. The latent semantic indexing selects the concept relevant context by its content ignoring key word density. The semantic analysis will specify the further techniques of detecting harmful semantic structures in the body of text selected. When any conceptual mismatches in the text content and ontology detected and professionally analyzed, the ontology knowledge bases get updates of the social networking service cyberthreat patterns. Thus, the combination of both produces cancelling effect on the defects of and uncovers latent relationships between linguistic units.
Conclusions. The outreaches tracing method proactively identifies cyberwarfare in virtual communities waged against individual, social and national cybersecurity. The suggested method increases efficiency and effectiveness of the national cybersecurity system on social networking services.
References
Hryshchuk R. V., Danyk Yu. H. za zah. red. prof. Danyka Yu. H. Osnovy kibernetychnoi bezpeky : monohr. Zhytomyr, ZhNAEU, 2016, 636 p.
Onyshchenko O. S., Horovyi V. M., Popyk V. I. ta in. Sotsialni merezhi yak instrument vzaiemovplyvu vlady ta hromadianskoho suspilstva : [monohrafiia] ; NAN Ukrainy, Nats. b-ka Ukrainy im. V. I. Vernadskoho. Kyiv, 2014, 260 p.
Lapshin S. V. Metody povysheniya pokazatelej kachestva fil’tracii DLP-sistem na osnove predmetno-orientirovannoj morfologicheskoj modeli estestvennogo yazyka : diss. … kand. texn. nauk : 05.13.19. Sankt-Peterburg, 2014, 115 p.
Kakie byvayut tipy kontenta i kak s nimi rabotat’ dlya realizacii uspeshnoj strategii kontent marketinga / Alphaland. in Internet Marketing [E’lektronnyj resurs]. Rezhim dostupa: http://alphaland.in/kakie-by-vayut-tipy-kontenta-i-kak-s-nimi/ (data obrashheniya: 29.10.16). Nazvanie s e’krana.
Chernyshuk S. V. Metodyka vyiavlennia kibernetychnykh zahroz u pryrodnomovnykh tekstakh, Problemy stvorennia, vyprobuvannia, zastosuvannia ta ekspluatatsii skladnykh informatsiinykh system, 2013, Vyp. 8, pp. 112–121.
Hryshchuk R. V. Teoretychni osnovy modeliuvannia protsesiv napadu na informatsiiu metodamy teorii dyferentsialnykh ihor ta dyferentsialnykh peretvoren: monohrafiia. Zhytomyr, Ruta, 2010, 280p.
Manning Chr., Raghavan P., Sch tze H. Introduction to Information Retrieval. Cambridge University Press, 2008, 544 p.
Sajt Xabrxabr Latentno-semanticheskij analiz. [E’lektronnyj resurs]. Rezhim dostupa : https://habrahabr.ru/post/110078/ (data obrashheniya : 29.10.16). Nazvanie s e’krana.
Deerwester S., Dumais S. T., Furnas G. W., Landauer T. K., Harshman R. Indexing by latent semantic analysis, Journal of theAmerican Society for Information Science, 1990, 41(6), pp. 391–407. DOI: 10.1002/(sici)1097-4571(199009)41:6<391::aidasi1>3.0.co;2-9.
Stemmer Portera dlya russkogo yazyka / O programmirovanii, algoritmax i ne tol’ko [E’lektronnyj resurs]. Rezhim dostupa: http://www.algorithmist.ru/2010/12/porter-stemmer-russian.html/ (data obrashheniya: 29.10.16). Nazvanie s e’krana.
Molodetska K. V. Uzahalnena klasyfikatsiia zahroz informatsiinii bezpetsi derzhavy v sotsialnykh internet-servisakh, Zashhita informacii, 2016, Vyp. 23, pp. 75–87.
Gruber T. R. A Translation Approach to Portable Ontology Specifications, Knowledge Acquisition, 1993, 5(2), pp. 199–220. DOI: 10.1006/knac.1993.1008.
Bouiadjra A. B., Benslimane S. M. A framework for evaluating and ranking ontologies, International Journal of Metadata, Semantics and Ontologies, 2013, 8(2), pp. 155. DOI: 10.1504/ijmso.2013.056600.
Vargas-Vera M., Nagy M. State of the art on Ontology alignment, International Journal of Knowledge Society Research, 2015, 6(1), pp. 17–42. DOI: 10.4018/ijksr.2015010102.
Priya M., Aswani Kumar C. A survey of state of the art of Ontology construction and merging using formal concept analysis, Indian Journal of Science and Technology, 2015, 8(24). DOI:10.17485/ijst/2015/v8i24/82808.
Vasyliuk Ya. R., Tesliuk V. M., Zelinskyi A. Ya. Analiz modelei, metodiv, pryntsypiv i zasobiv dlia pobudovy ontolohii oblasti mikroelektromekhanichnykh system, Nauk. visn. Nats. lisotekhn. un-tu Ukr. : zb. nauk.-tekhn. pr., 2011, Vyp. 21(12), pp. 322–330.
Wang W., Barnaghi P. M., Bargiela A. Probabilistic topic models for learning Terminological Ontologies, IEEE Transactions on Knowledge and Data Engineering, 2010, 22(7), pp. 1028–1040. DOI: 10.1109/tkde.2009.122.
Marchenko O. O. Porivniannia metodiv ontolohichnoho semantychnoho analizu ta alhorytmiv latentnoho semantychnoho analizu, Visn. Kyivskoho nats. un-tu im. T. Shevchenka. Seriia fizyko-matematychni nauky, 2012, 2, pp. 169–174.
Trolesfera Teksty.org.ua [Elektronnyi resurs]. Rezhym dostupu : http://texty.org.ua/d/fb-trolls/ (data zvernennia: 29.10.16). Nazva z ekranu.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2017 K. Molodetska-Hrynchuk
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Creative Commons Licensing Notifications in the Copyright Notices
The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions.
The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles.
The journal allows to reuse and remixing of its content, in accordance with a Creative Commons license СС BY -SA.
Authors who publish with this journal agree to the following terms:
-
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License CC BY-SA that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
-
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
-
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.