COMPLEX METHOD OF DETERMINING THE LOCATION OF SOCIAL NETWORK AGENTS IN THE INTERESTS OF INFORMATION OPERATIONS

Main Article Content

Serhii Herasymov
Andrii Tkachov
Sergii Bazarnyi

Abstract

The researcher developed a method for determining the location of social network agents in the interest of conducting an information operation based on a comprehensive approach to data analysis of the information system. The relevance of the method is determined by the need to specify the enemy's target audience in the area of the information operation. Results. The author proposed a complex method for determining the location of social network agents, which is based on the combination of data from the analysis of the social connections of the specified agent, geotags and the time of registration of his friends in the social network, databases of IP addresses and geolocations of social network agents. The advantage of the developed method is the possibility of its application without direct access to the devices of agents of the social network that use the data of global positioning satellite systems. Conclusion. The application of the proposed complex method of determining the location of agents of social networks makes it possible to increase the effectiveness of information operations due to a more accurate definition of the enemy's target audience in the area of operations. The direction of improvement of the developed method can be its integration with complex information systems of psychological influence, as well as the use of machine learning methods and algorithms.

Article Details

How to Cite
Herasymov , S. ., Tkachov , A. ., & Bazarnyi , S. . (2024). COMPLEX METHOD OF DETERMINING THE LOCATION OF SOCIAL NETWORK AGENTS IN THE INTERESTS OF INFORMATION OPERATIONS. Advanced Information Systems, 8(1), 31–36. https://doi.org/10.20998/2522-9052.2024.1.04
Section
Methods of information systems synthesis
Author Biographies

Serhii Herasymov , , Military Institute of Tank Troops, National Technical University "Kharkiv Polytechnic Institute", Kharkiv

Doctor of Technical Sciences, Professor, Head of the Department of Weapons and Military Equipment Operation

Andrii Tkachov , National Technical University "Kharkiv Polytechnic Institute", Kharkiv

Candidate of Technical Sciences, Associate Professor, Associate Professor of Cyber Security Department

Sergii Bazarnyi , The National Defense University of Ukraine, Kyiv

graduate student

References

Yevseyev, S., Ponomarenko, V., Laptiev, O. et. al. (2021), Synergy of building cybersecurity systems, RS TECHNOLOGY CENTER, Kharkiv, 188 p., doi: https://doi: 10.15587/978-617-7319-31-2

(2014), AJP-3.10.1. Allied Joint Doctrine for Psychological Operations, Edition B, Version 1, NATO doctrine, September 2014, 106 p., available at: https://info.publicintelligence.net/NATO-PSYOPS.pdf

Bazarnyі, S. V. (2023), “A method of identifying agents of social networks with the greatest influence”, Modern information technologies in the field of security and defense: science, No. 1(46)/2023, pp. 145–150, doi: https://doi.org/10.33099/2311-7249/2023-46-1-145-150.

Mourad, A., Scholer, F., Sanderson, M. and Magdy, W. (2018), “How well did you locate me?: effective evaluation of Twitter user geolocation”, ASONAM '18: Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, August 2018, pp. 437–440, available at: https://dl.acm.org/doi/10.5555/3382225.3382317

Zhong, T., Wang, T., Wang, J., Wu, J. and Zhou, F. (2020), “Multiple-aspect Attentional Graph Neural Networks for Online Social Network User Localization”, IEEE Access (IF3.367), Vol. 8, pp. 95223–95234, doi: https://doi.org/10.1109/ACCESS.2020.2993876

McCallum, A., Nigam, K. (1998), “A Comparison of Event Models for Naive Bayes Text Classification,” AAAI 1998: Learning for Text Categorization, pp. 41–48, available at: http://courses.washington.edu/ling572/papers/mccallum1998_AAAI.pdf

Zhang, W. and Gao, F. (2013), “Performance analysis and improvement of naïve Bayes in text classification application”, Proceedings of the IEEE Conference Anthology, China, pp. 1–4. doi: https://doi.org/10.1109/ANTHOLOGY.2013.6784818

Rahimi, A., Cohn, T. and Baldwin, T. (2017), “A Neural Model for User Geolocation and Lexical Dialectology”, Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, Association for Computational Linguistics Vancouver, Canada, Vol. 2, Short Papers, pp. 209–216, available at: https://aclanthology.org/P17-2033.pdf

Zola, P., Cortez, P. and Carpita, M. (2019), “Twitter user geolocation using web country noun searches,” Decision Support Systems, Vol. 120, pp. 50–59, doi: https://doi.org/10.1016/j.dss.2019.03.006

Semenov, S., Sira, O., Gavrylenko, S. and Kuchuk, N. (2019), “Identification of the state of an object under conditions of fuzzy input data“, Eastern-European Journal of Enterprise Technologies, Vol 1, No 4 (97), pp. 22-30, doi:

https://doi.org/10.15587/1729-4061.2019.157085

Dan, O., Parikh, V. and Davison, B. (2018), “IP Geolocation through Reverse DNS”, Networking and Internet Architecture, abs/1811.04288 (2018), pp. 1–10, doi: https://doi.org/10.48550/arXiv.1811.04288

Kong, L., Liu, Z. and Huang, Y. (2014), “Spot: Locating social media users based on social network context”. Proceedings of the VLDB Endowment, vol. 7, no. 13, pp. 1681–1684, doi: https://doi.org/10.14778/2733004.2733060

Kuchuk, N., Mozhaiev, O., Semenov, S., Haichenko, A., Kuchuk, H., Tiulieniev, S., Mozhaiev, M., Davydov, V., Brusakova, O. and Gnusov, Y. (2023), “Devising a method for balancing the load on a territorially distributed foggy environment”, Eastern-European Journal of Enterprise Technologies, Vol. 1(4-121), pp. 48–55, doi: http://dx.doi.org/10.15587/1729-4061.2023.274177

Sandeep, Singhal (2002), “Top 10 vulnerabilities in Today`s WI-FI Networks”, Computerworld, US, available at: https://www.computerworld.com/article/2577244/top-10-vulnerabilities-in-today-s-wi-fi-networks.html

Podorozhniak, A., Liubchenko, N., Oliinyk, V. and Roh, V. (2023), “Research Application of the Spam Filtering and Spammer Detection Algorithms on Social Media and Messengers”, Advanced Information Systems, Vol. 7, No. 3, pр. 60-66, doi:

https://doi.org/10.20998/2522-9052.2023.3.09

Abdullah, Y. N. (2023), “Accuracy and Coverage Analysis of IP Geolocation Databases”, 2023 International Balkan Conference on Communications and Networking (BalkanCom), İstanbul, Turkiye, pp. 1–6. doi:

https://doi.org/10.1109/BalkanCom58402.2023.10167899

Shmatko, O., Herasymov, S., Lysetskyi, Y., Yevseiev, S., Sievierinov О., Voitko, T., Zakharzhevskyi, A., Makogon, H., Nesterov, A. and Bondarenko, K. (2023), “Development of the automated decision-making system synthesis method in the management of information security channels”, Eastern-European Journal of Enterprise Technologies, Vol. 6/9 (126),

pр. 39–49, doi: https://doi.org/10.15587/1729-4061.2023.293511

Yevseiev, S., Hryshchuk, R., Molodetska, K. et. al. (2022), Modeling of security systems for critical infrastructure facilities, РС ТЕСHNOLOGY СЕNTЕR, Kharkiv, 196 p., doi: https://doi.org/10.15587/978-617-7319-57-2

Kovalenko, A. and Kuchuk, H. (2022), “Methods to Manage Data in Self-healing Systems”, Studies in Systems, Decision and Control, Vol. 425, pp. 113–171, doi: https://doi.org/10.1007/978-3-030-96546-4_3

Dotsenko, N., Chumachenko, I., Galkin, A., Kuchuk, H. and Chumachenko, D. (2023), “Modeling the Transformation of Configuration Management Processes in a Multi-Project Environment”, Sustainability (Switzerland), Vol. 15(19), 14308, doi: https://doi.org/10.3390/su151914308

(2016), “SMS Spam Collection Dataset: Collection of SMS messages tagged as spam or legitimate”, UCI MACHINE LEARNING, available at: https://www.kaggle.com/uciml/sms-spam-collection-dataset

Jensen, G.G., Busch, M.B., Piovesan, M. And Haerter, J.O. (2023), “Nudging cooperation among agents in an experimental social network”, Applied Network Science, Vol. 8(1), 62, doi: https://doi.org/10.1007/s41109-023-00588-x

Fennell, S.C., Gleeson, J.P., Quayle, M., Durrheim, K. and Burke, K. (2023), Agent-based null models for examining experimental social interaction networks, Scientific Reports, 13(1), 5249, doi: https://doi.org/10.1038/s41598-023-32295-z

Dun B., Zakovorotnyi, O. and Kuchuk, N. (2023), “Generating currency exchange rate data based on Quant-Gan model”, Advanced Information Systems, Vol. 7, no. 2, pp. 68–74, doi: http://dx.doi.org/10.20998/2522-9052.2023.2.10

Gomathi, B., Saravana Balaji, B., Krishna Kumar, V., Abouhawwash, M., Aljahdali, S., Masud, M. and Kuchuk, N. (2022), “Multi-Objective Optimization of Energy Aware Virtual Machine Placement in Cloud Data Center”, Intelligent Automation and Soft Computing, Vol. 33(3), pp. 1771–1785, doi: http://dx.doi.org/10.32604/iasc.2022.024052

(2023), Python for Beginners. Python Software Foundation, available at: https://www.python.org/about/gettingstarted/

Messaoudi, C., Romdhane, L.B. and Guessoum, Z. (2023), “AMIR: A Multi-agent Approach for Influence Detection in Social Networks”, Lecture Notes in Networks and Systems, 740 LNNS, pp. 242–253, doi: http://dx.doi.org/10.1007/978-3-031-38333-5_25