Optimum control model of Malicious news spread on Social networks having Hidden accounts

被引:0
|
作者
Jain, Ankur [1 ]
Dhar, Joydip [2 ]
机构
[1] Manipal Univ, Sch Basic Sci, Dept Math & Stat, Jaipur, India
[2] ABV Indian Inst Informat Technol & Management, Dept Appl Sci, Gwalior 474015, MP, India
来源
关键词
Hidden attack; Basic influence number; Network alertness; User characteristics; Pontryagin's maximum principle; MALWARE PROPAGATION; DYNAMICS;
D O I
10.1016/j.rico.2024.100468
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Extremists are increasingly using social media to recruit and radicalize other users and increase their money. Terrorists can use popular social networks accounts and perform their activities in a hidden way. So, it is crucial to create a fruitful mechanism for controlling the spread of misinformation. Otherwise, a large number of people can mislead by this terrorist activity by joining them. Here, we propose malicious news spreading model incorporating hidden attackers of a social network. A threshold is defined for deciding the extinction of malicious news from a social network. Here, we show the importance of network alertness and activity of cybersecurity agencies in the modified model. Moreover, we obtained the optimal values of the control parameters for emergencies.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Malicious accounts: Dark of the social networks
    Adewole, Kayode Sakariyah
    Anuar, Nor Badrul
    Kamsin, Amirrudin
    Varathan, Kasturi Dewi
    Razak, Syed Abdul
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 79 : 41 - 67
  • [2] Discovering hidden suspicious accounts in online social networks
    Cao, Jian
    Fu, Qiang
    Li, Qiang
    Guo, Dong
    [J]. INFORMATION SCIENCES, 2017, 394 : 123 - 140
  • [3] Uncovering Large Groups of Active Malicious Accounts in Online Social Networks
    Cao, Qiang
    Yang, Xiaowei
    Yu, Jieqi
    Palow, Christopher
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 477 - 488
  • [4] Malicious Accounts Detection in Online Social Networks Based on Feature Extraction
    Yuan, Deyu
    Chen, Shicong
    Huang, Shuhua
    Ye, Han
    Sun, Haichun
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 127 : 107 - 108
  • [5] Using Connected Accounts to Enhance Information Spread in Social Networks
    Sela, Alon
    Cohen-Milo, Orit
    Kagan, Eugene
    Zwilling, Moti
    Ben-Gal, Irad
    [J]. COMPLEX NETWORKS AND THEIR APPLICATIONS VIII, VOL 1, 2020, 881 : 459 - 468
  • [6] A Survey of Malicious Accounts Detection in Large-Scale Online Social Networks
    Xin, Yang
    Zhao, Chensu
    Zhu, Hongliang
    Gao, Mingcheng
    [J]. 2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 155 - 158
  • [7] Malicious accounts detection from online social networks: a systematic review of literature
    Ben Sassi, Imen
    Ben Yahia, Sadok
    [J]. INTERNATIONAL JOURNAL OF GENERAL SYSTEMS, 2021, 50 (07) : 741 - 814
  • [8] A model for learning the news in social networks
    Krishnan Rajagopalan
    Venkatesh Srinivasan
    Alex Thomo
    [J]. Annals of Mathematics and Artificial Intelligence, 2015, 73 : 125 - 138
  • [9] A model for learning the news in social networks
    Rajagopalan, Krishnan
    Srinivasan, Venkatesh
    Thomo, Alex
    [J]. ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE, 2015, 73 (1-2) : 125 - 138
  • [10] Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study
    Xia, Zenghua
    Liu, Chang
    Gong, Neil Zhenqiang
    Li, Qi
    Cui, Yong
    Song, Dawn
    [J]. KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2019, : 2012 - 2022