IDENTIFYING AND COUNTERING MALICIOUS INFORMATION IN SOCIAL NETWORKS
P. A. Glibovsky, P. N. Serebryakov, P. V. Timashov Mozhaisky Military Aerospace Academy
Annotation: The algorithm of ranking sources by potential used to identify malicious information in social networks and the algorithm of ranking countermeasures used to counteract it is considered. They allow you to achieve the required level of protection of users in social networks. Resource consumption, efficiency and objectivity were selected as indicators of the criteria for the effectiveness of the methodology processes. The resource consumption of processes is proposed to evaluate by indicators: "The use of the central processor device", "The use of RAM" and "Operator operation time". When comparing the processes with each other, we take the time of the measurements of the algorithm for ranking sources by potential and sorting the objects of influence.
Keywords: ranking, potential, countermeasure, performance criteria.