Skip to main content

Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks

  • Conference paper
  • First Online:
Social Informatics (SocInfo 2018)

Abstract

The paper considers an interdisciplinary problem of protecting the information space of social networks from unwanted and malicious information. One of the means for solving this problem is the development of an integrated system for monitoring and counteraction to malicious influences in social networks. The architecture of this system is proposed. The architecture includes components for collection, preprocessing and storage of information objects, semantic analysis of malicious information objects, identifying sources of attack and target audiences, analyzing the distribution channels of malicious information objects, and complex recognition of the impact elements. The issues of implementation and functioning of the components of the proposed system are discussed. The experimental evaluation showed high efficiency of the accepted architectural solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sadilek, A., Kautz, H.A., Silenzio, V.: Modeling spread of disease from social interactions. In: Proceedings of the Sixth International Conference on Weblogs and Social Media, Dublin, Ireland, 4–7 June 2012

    Google Scholar 

  2. Backstrom, L., Sun, E., Marlow, C.: Find me if you can: improving geographical prediction with social and spatial proximity. In: Proceedings of the 19th International Conference on World Wide Web, pp. 61–70. ACM (2010)

    Google Scholar 

  3. Jurgens, D.: That’s what friends are for: inferring location in online social media platforms based on social relationships. ICWSM 13, 273–282 (2013)

    Google Scholar 

  4. Chen, J., Liu, Y., Zou, M.: Home location profiling for users in social media. Inf. Manag. 53(1), 135–143 (2016)

    Article  Google Scholar 

  5. Trofimovich, U.S., Kozlov, I.S., Turdakov, D.Y.: Approaches to estimate location of social network users based on social graph. Inst. Syst. Program. Russ. Acad. Sci. Part 28(6), 185–196 (2016)

    Google Scholar 

  6. Kao, H.A., Chen, H.H.: Comment extraction from blog posts and its applications to opinion mining. In: The Seventh International Conference on Language Resources and Evaluation (LREC) (2010)

    Google Scholar 

  7. Barua, J., Patel, D., Goyal, V.: TiDE: Template-independent Discourse data Extraction. In: Madria, S., Hara, T. (eds.) DaWaK 2015. LNCS, vol. 9263, pp. 149–162. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22729-0_12

    Chapter  Google Scholar 

  8. Gubanov, D.A., Novikov, D.A., Chkhartishvili, A.G.: Social Networks: Models of Informational Influence, Control and Confrontation. FIZMATLIT, Moscow (2010)

    MATH  Google Scholar 

  9. Kotenko, I., Chechulin, A., Shorov, A., Komashinsky, D.: Analysis and evaluation of web pages classification techniques for inappropriate content blocking. In: Perner, P. (ed.) ICDM 2014. LNCS (LNAI), vol. 8557, pp. 39–54. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-08976-8_4

    Chapter  Google Scholar 

  10. Kotenko, I., Chechulin, A., Komashinsky, D.: Categorisation of web pages for protection against inappropriate content in the internet. Int. J. Internet Protoc. Technol. 1(10), 61–71 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

The work is performed by the grant of RSF #18-71-10094 in SPIIRAS.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Igor Kotenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kotenko, I., Saenko, I., Chechulin, A., Desnitsky, V., Vitkova, L., Pronoza, A. (2018). Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks. In: Staab, S., Koltsova, O., Ignatov, D. (eds) Social Informatics. SocInfo 2018. Lecture Notes in Computer Science(), vol 11186. Springer, Cham. https://doi.org/10.1007/978-3-030-01159-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01159-8_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01158-1

  • Online ISBN: 978-3-030-01159-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics