Abstract
The paper considers an interdisciplinary problem of protecting the information space of social networks from unwanted and malicious information. One of the means for solving this problem is the development of an integrated system for monitoring and counteraction to malicious influences in social networks. The architecture of this system is proposed. The architecture includes components for collection, preprocessing and storage of information objects, semantic analysis of malicious information objects, identifying sources of attack and target audiences, analyzing the distribution channels of malicious information objects, and complex recognition of the impact elements. The issues of implementation and functioning of the components of the proposed system are discussed. The experimental evaluation showed high efficiency of the accepted architectural solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sadilek, A., Kautz, H.A., Silenzio, V.: Modeling spread of disease from social interactions. In: Proceedings of the Sixth International Conference on Weblogs and Social Media, Dublin, Ireland, 4–7 June 2012
Backstrom, L., Sun, E., Marlow, C.: Find me if you can: improving geographical prediction with social and spatial proximity. In: Proceedings of the 19th International Conference on World Wide Web, pp. 61–70. ACM (2010)
Jurgens, D.: That’s what friends are for: inferring location in online social media platforms based on social relationships. ICWSM 13, 273–282 (2013)
Chen, J., Liu, Y., Zou, M.: Home location profiling for users in social media. Inf. Manag. 53(1), 135–143 (2016)
Trofimovich, U.S., Kozlov, I.S., Turdakov, D.Y.: Approaches to estimate location of social network users based on social graph. Inst. Syst. Program. Russ. Acad. Sci. Part 28(6), 185–196 (2016)
Kao, H.A., Chen, H.H.: Comment extraction from blog posts and its applications to opinion mining. In: The Seventh International Conference on Language Resources and Evaluation (LREC) (2010)
Barua, J., Patel, D., Goyal, V.: TiDE: Template-independent Discourse data Extraction. In: Madria, S., Hara, T. (eds.) DaWaK 2015. LNCS, vol. 9263, pp. 149–162. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22729-0_12
Gubanov, D.A., Novikov, D.A., Chkhartishvili, A.G.: Social Networks: Models of Informational Influence, Control and Confrontation. FIZMATLIT, Moscow (2010)
Kotenko, I., Chechulin, A., Shorov, A., Komashinsky, D.: Analysis and evaluation of web pages classification techniques for inappropriate content blocking. In: Perner, P. (ed.) ICDM 2014. LNCS (LNAI), vol. 8557, pp. 39–54. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-08976-8_4
Kotenko, I., Chechulin, A., Komashinsky, D.: Categorisation of web pages for protection against inappropriate content in the internet. Int. J. Internet Protoc. Technol. 1(10), 61–71 (2017)
Acknowledgements
The work is performed by the grant of RSF #18-71-10094 in SPIIRAS.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Kotenko, I., Saenko, I., Chechulin, A., Desnitsky, V., Vitkova, L., Pronoza, A. (2018). Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks. In: Staab, S., Koltsova, O., Ignatov, D. (eds) Social Informatics. SocInfo 2018. Lecture Notes in Computer Science(), vol 11186. Springer, Cham. https://doi.org/10.1007/978-3-030-01159-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-01159-8_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01158-1
Online ISBN: 978-3-030-01159-8
eBook Packages: Computer ScienceComputer Science (R0)