OUTREACHES CONTENT TRACING TECHNIQUE FOR SOCIAL NETWORKING SERVICES

Authors

  • K. Molodetska-Hrynchuk Zhitomir National Agroecological University, Ukraine

DOI:

https://doi.org/10.15588/1607-3274-2017-2-13

Keywords:

Social networking services, cybersecurity, threats, text content, latent semantic indexing, semantic analysis, ontology

Abstract

Context. Today’s social networking services have turned into an efficient communication tool for the members of virtual communities termed actors. The high rate of content dissemination, transboundary interactions between the actors and the drives to group the latter up, could make the services efficient cyberwarfare against the person, society and country. Text content is the most frequently used means of communication between the actors of virtual communities. The actual theoretical and applied research, aimed at designing maintenance procedures for the national cybersecurity system, is to solve the problem of text content monitoring.

Objective. The research objective is to suggest and design a method for detecting outreaches by their content in the collection of text to solve the problem of efficient monitoring the social media.

Method. The method designed is based on the modern content analysis approaches, i. e. the latent semantic indexing and the semantic analysis based on ontology.

Results. The latent semantic indexing selects the concept relevant context by its content ignoring key word density. The semantic analysis will specify the further techniques of detecting harmful semantic structures in the body of text selected. When any conceptual mismatches in the text content and ontology detected and professionally analyzed, the ontology knowledge bases get updates of the social networking service cyberthreat patterns. Thus, the combination of both produces cancelling effect on the defects of and uncovers latent relationships between linguistic units.

Conclusions. The outreaches tracing method proactively identifies cyberwarfare in virtual communities waged against individual, social and national cybersecurity. The suggested method increases efficiency and effectiveness of the national cybersecurity system on social networking services.

Author Biography

K. Molodetska-Hrynchuk, Zhitomir National Agroecological University

Candidate of Technical Sciences, Docent, Associate Professor at the Information Technologies and System Modelling sub-Department

References

Hryshchuk R. V., Danyk Yu. H. za zah. red. prof. Danyka Yu. H. Osnovy kibernetychnoi bezpeky : monohr. Zhytomyr, ZhNAEU, 2016, 636 p.

Onyshchenko O. S., Horovyi V. M., Popyk V. I. ta in. Sotsialni merezhi yak instrument vzaiemovplyvu vlady ta hromadianskoho suspilstva : [monohrafiia] ; NAN Ukrainy, Nats. b-ka Ukrainy im. V. I. Vernadskoho. Kyiv, 2014, 260 p.

Lapshin S. V. Metody povysheniya pokazatelej kachestva fil’tracii DLP-sistem na osnove predmetno-orientirovannoj morfologicheskoj modeli estestvennogo yazyka : diss. … kand. texn. nauk : 05.13.19. Sankt-Peterburg, 2014, 115 p.

Kakie byvayut tipy kontenta i kak s nimi rabotat’ dlya realizacii uspeshnoj strategii kontent marketinga / Alphaland. in Internet Marketing [E’lektronnyj resurs]. Rezhim dostupa: http://alphaland.in/kakie-by-vayut-tipy-kontenta-i-kak-s-nimi/ (data obrashheniya: 29.10.16). Nazvanie s e’krana.

Chernyshuk S. V. Metodyka vyiavlennia kibernetychnykh zahroz u pryrodnomovnykh tekstakh, Problemy stvorennia, vyprobuvannia, zastosuvannia ta ekspluatatsii skladnykh informatsiinykh system, 2013, Vyp. 8, pp. 112–121.

Hryshchuk R. V. Teoretychni osnovy modeliuvannia protsesiv napadu na informatsiiu metodamy teorii dyferentsialnykh ihor ta dyferentsialnykh peretvoren: monohrafiia. Zhytomyr, Ruta, 2010, 280p.

Manning Chr., Raghavan P., Sch tze H. Introduction to Information Retrieval. Cambridge University Press, 2008, 544 p.

Sajt Xabrxabr Latentno-semanticheskij analiz. [E’lektronnyj resurs]. Rezhim dostupa : https://habrahabr.ru/post/110078/ (data obrashheniya : 29.10.16). Nazvanie s e’krana.

Deerwester S., Dumais S. T., Furnas G. W., Landauer T. K., Harshman R. Indexing by latent semantic analysis, Journal of theAmerican Society for Information Science, 1990, 41(6), pp. 391–407. DOI: 10.1002/(sici)1097-4571(199009)41:6<391::aidasi1>3.0.co;2-9.

Stemmer Portera dlya russkogo yazyka / O programmirovanii, algoritmax i ne tol’ko [E’lektronnyj resurs]. Rezhim dostupa: http://www.algorithmist.ru/2010/12/porter-stemmer-russian.html/ (data obrashheniya: 29.10.16). Nazvanie s e’krana.

Molodetska K. V. Uzahalnena klasyfikatsiia zahroz informatsiinii bezpetsi derzhavy v sotsialnykh internet-servisakh, Zashhita informacii, 2016, Vyp. 23, pp. 75–87.

Gruber T. R. A Translation Approach to Portable Ontology Specifications, Knowledge Acquisition, 1993, 5(2), pp. 199–220. DOI: 10.1006/knac.1993.1008.

Bouiadjra A. B., Benslimane S. M. A framework for evaluating and ranking ontologies, International Journal of Metadata, Semantics and Ontologies, 2013, 8(2), pp. 155. DOI: 10.1504/ijmso.2013.056600.

Vargas-Vera M., Nagy M. State of the art on Ontology alignment, International Journal of Knowledge Society Research, 2015, 6(1), pp. 17–42. DOI: 10.4018/ijksr.2015010102.

Priya M., Aswani Kumar C. A survey of state of the art of Ontology construction and merging using formal concept analysis, Indian Journal of Science and Technology, 2015, 8(24). DOI:10.17485/ijst/2015/v8i24/82808.

Vasyliuk Ya. R., Tesliuk V. M., Zelinskyi A. Ya. Analiz modelei, metodiv, pryntsypiv i zasobiv dlia pobudovy ontolohii oblasti mikroelektromekhanichnykh system, Nauk. visn. Nats. lisotekhn. un-tu Ukr. : zb. nauk.-tekhn. pr., 2011, Vyp. 21(12), pp. 322–330.

Wang W., Barnaghi P. M., Bargiela A. Probabilistic topic models for learning Terminological Ontologies, IEEE Transactions on Knowledge and Data Engineering, 2010, 22(7), pp. 1028–1040. DOI: 10.1109/tkde.2009.122.

Marchenko O. O. Porivniannia metodiv ontolohichnoho semantychnoho analizu ta alhorytmiv latentnoho semantychnoho analizu, Visn. Kyivskoho nats. un-tu im. T. Shevchenka. Seriia fizyko-matematychni nauky, 2012, 2, pp. 169–174.

Trolesfera Teksty.org.ua [Elektronnyi resurs]. Rezhym dostupu : http://texty.org.ua/d/fb-trolls/ (data zvernennia: 29.10.16). Nazva z ekranu.

How to Cite

Molodetska-Hrynchuk, K. (2017). OUTREACHES CONTENT TRACING TECHNIQUE FOR SOCIAL NETWORKING SERVICES. Radio Electronics, Computer Science, Control, (2), 117–126. https://doi.org/10.15588/1607-3274-2017-2-13

Issue

Section

Progressive information technologies