Print

PDF To download article.

UDK 004.415.538

DOI: 10.15507/2658-4123.029.201901.020-039

 

System-Dynamic Modeling of Network Information Operations

 

Vladimir A. Minaev
Professor, Department of Information Security, Chair of Information Protection, Bauman Moscow State Technical University (2nd 5, bd. 1 Baumanskaya St., Moscow 105005, Russia), D.Sc. (Engineering), ResearcherID: B-4420-2016, ORCID: https://orcid.org/0000-0002-5342-0864, This email address is being protected from spambots. You need JavaScript enabled to view it.

Mikhail P. Sychev
Professor, Department of Information Security, Chair of Information Protection, Bauman Moscow State Technical University (2nd 5, bd. 1 Baumanskaya St., Moscow 105005, Russia), D.Sc. (Engineering), ResearcherID: E-1068-2019, ORCID: https://orcid.org/0000-0002-7535-7704, This email address is being protected from spambots. You need JavaScript enabled to view it.

Ekaterina V. Vaits
Associate Professor, Department of Information Security, Chair of Information Protection, Bauman Moscow State Technical University (2nd 5, bd. 1 Baumanskaya St., Moscow 105005, Russia), Ph. D. (Engineering), ResearcherID: D-9164-2019, ORCID: https://orcid.org/0000-0002-4629-6252, This email address is being protected from spambots. You need JavaScript enabled to view it.

Konstantin M. Bondar
Professor, Department of Information and Technical Support of Internal Affairs, Far Eastern Law Institute of the Ministry of Internal Affairs of the Russia (15 Kazarmennyy Pereulok, Khabarovsk 680020, Russia), Ph.D., Associate Professor, ResearcherID: D-9910-2019, ORCID: https://orcid.org/0000-0002-6928-0413, This email address is being protected from spambots. You need JavaScript enabled to view it.

Introduction. Information-technical and information-psychological influences are the main negative factors affecting the information security according to the Information Security Doctrine of the Russian Federation. Therefore, modeling, evaluating and forecasting information influences on social groups and organizing adequate information counteraction are urgent tasks of management.
Materials and Methods. The system-dynamic models of information influences in social networks and groups are considered. Their application for purposes of counteraction to information terrorism and extremism is proved. The description in the form of flowcharts is given. Systems of differential equations are presented. Experiments with models using the advanced simulation platform Anylogic have been carried out.
Results. In a sample of Russian settlements based on the cluster analysis there have been found homogeneous typological groups that differ in the average time of disseminating information in social networks. Based on Gibbs’s Postulate, the system-dynamic model of information influences on students has been successfully tested.
Discussion and Conclusion. The high consistency of simulation results with empirical data (determination coefficients of at least 90 %) is shown. Models allow forecasting the information influence and information counteraction and playing different scenarios for the dynamics of these processes.

Keywords: simulation modeling, terrorism, extremism, information influences, information counteraction, management, social network, topology, typology, cluster analysis

For citation: Minaev V.A., Sychev M.P., Vaits E.V., Bondar K.M. System-Dynamics Modeling of Network Information Operations. Inzhenernyye tekhnologii i sistemy = Engineering Technologies and Systems. 2019; 29(1):20-39. DOI: https://doi.org/10.15507/2658-4123.029.201901.020-039

Contribution of the authors: V. A. Minaev – mathematical description of the models, formulation of the problems, discussion of the results; M. P. Sychev – justification of the simulation platform, formulation of conclusions; E. V. Vaits – simulation experiments, description of the results; K. M. Bondar – literature review, analysis of the research results.

All authors have read and approved the final version of the paper.

Submitted 05.12.2018; revised 21.01.2019; published online 29.03.2019

 

REFERENCES

1. Minaev V.A., Ovchinskiy A.S., Skryl S.V., Trostyanskiy S.N. [How to manage mass consciousness. Modern models]. Moscow: Russian New University; 2013. (In Russ.)

2. Minaev V.A., Dvoryankin S.V. Modeling the dynamics of information and psychological influence on mass consciousness. Voprosy kiberbezopasnosti = Cybersecurity Issues. 2016; 5:56-64. (In Russ.)

3. Minaev V.A., Dvoryankin S.V. Foundation and description of informational and psychological destructive nature influences dynamics model in social networks. Bezopasnost informatsionnykh tekhnologiy = IT Security. 2016; 23(3):40-52. (In Russ.)

4. Minaev V.A., Sychev M.P., Vaits E.V., Gracheva Y.V. Modeling of threats to information security using principles of system dynamics. Voprosy radioelektroniki = Questions of Radio Electronics. 2017; 6:75-82. (In Russ.)

5. Gubanov D.A., Novikov D.A., Chkhartishvili A.G. [Social networks: models of information influence, management and confrontations]. Moscow: Publishing House of Physical, Mathematical and Technical Literature; 2010. (In Russ.)

6. Minaev V.A., Sychev M.P., Vaits E.V., Kirakosyan A.E. System-dynamic modeling of information influences on society. Voprosy radioelektroniki = Questions of Radio Electronics. 2017; 11:35-43. (In Russ.)

7. Alekhnovich S.O., Slizovskiy D.E., Ozhiganov E.N. System-dynamical modeling: the principles, structure and variables (on the example of the Moscow region). Vestnik Rossiyskogo universiteta druzhby narodov. Seriya: Politologiya = Bulletin of Peoples’ Friendship University of Russia. Series: Political Science. 2009; 1:22-36. (In Russ.)

8. Liu W., Cui Y., Li. Y. Information systems security assessment based on system dynamics. International Journal of Security and Its Applications. 2015; 9(2):73-84.

9. Kim A.C., Lee S.M., Lee D.H. Compliance risk assessment measures of financial information security using system dynamics. International Journal of Security and Its Applications. 2012; 6(4):191-200.

10. Behara R.S., Derrick Huang C. A. System dynamics model of information security investments. Journal of Information System Security. 2010; 6(2):1572-1583.

11. Gusarov A.N., Zhukov D.O., Kosarevа A.V. Description of dynamics of computer threats propagation in data computer networks with delay of antivirus software operation. Vestnik MGTU im. N. E. Baumana. Ser.: Priborostroyeniye = Herald of the Bauman Moscow State Technical University. Series Instrument Engineering. 2010; 1:112-120. (In Russ.)

 

Лицензия Creative Commons
This work is licensed under a Creative Commons Attribution 4.0 License.