graduate student
Russian Federation
In modern conditions, information flows are complicated by unreliable and harmful data, which negatively affects management systems and information security. Tools are needed to filter information before it is processed. The increase in false and malicious messages requires effective algorithms for analyzing and managing data that ensure the stability of automated systems. The purpose of the research is to create effective mathematical and computational methods for the analysis, classification and management of information to improve the reliability of systems and the reliability of data. A method of simulation modeling based on a mathematical model with elements of probability theory is proposed, where the information flow is divided into reliable, false and harmful information. To classify messages, probabilistic methods are used, taking into account prior and posteriori probabilities, as well as the analysis of network, temporal and semantic characteristics. Unlike existing methods, this one focuses on analyzing data before it is used, which reduces the risk of destructive impacts. A mathematical model has been developed for the analysis of information flows, including reliable, false and malicious information. The model uses probabilistic approaches and considers the network, temporal and semantic characteristics of messages to classify them and minimize their destructive impact. The model allows you to effectively consider the characteristics of each source, distinguishing reliable, false and malicious messages, which ensures high accuracy and reliability of the resulting information flow. This end-to-end solution improves data integrity and can be used in management and information security systems to minimize the impact of disruptive information and enable informed decision-making. The results can be used to monitor information threats, filter malicious information and ensure the security of critical systems, as well as support decision-making in government agencies, the economy and energy, increasing trust in information systems.
complex information flow, classification of information, false information, malicious information, reliable information, probabilistic models, information security, flow analysis, entropy
1. Fake news detector using deep learning / A. Akshansh [et al.] // International Journal of Advanced Research. 2023. № 11. Vol. 4. P. 1612–1621. DOI:https://doi.org/10.21474/IJAR01/16831
2. Revisiting Fake News Detection: Towards Temporality-aware Evaluation by Leveraging Engagement Earliness / J. Kim [et al.] // arXivLabs. 2024. № 2411. Vol. 12775. P. 1–11. DOI:https://doi.org/10.1145/3701551.370352
3. Zhou X., Zafarani R. A survey of fake news: Fundamental theories, detection methods, and opportunities // ACM Computing Surveys. 2020. № 53 (5). P. 1–40. DOI:https://doi.org/10.1145/3395046
4. Privalov A.N., Smirnov V.A. Poisk fejkovyh sajtov s ispol'zovaniem metoda opredeleniya vizual'nogo skhodstva stranic // Izvestiya TulGU. Tekhnicheskie nauki. 2022. № 9. S. 260–264. DOI:https://doi.org/10.24412/2071-6168-2022-9-260-265
5. Zhou X., Zafarani R., Wu J. SAFE: Similarity-Aware Multi-Modal Fake News Detection. // Advances in Knowledge Discovery and Data Mining. Lecture Notes in Computer Science. 2020. Vol. 12085. P. 1–13. DOI:https://doi.org/10.48550/arXiv.2003.04981
6. Hammouchi H., Ghogho M. Evidence-Aware Multilingual Fake News Detection // IEEE Access. 2022. № 99. P. 1–11. DOI:https://doi.org/10.1109/ACCESS.2022.3220690
7. Zhou Y. The Silent Saboteur: The Impact and Management of Malicious Word-Of-Mouth in The Digital Age // Highlights in Business Economics and Management. 2024. № 41. P. 381–386. DOI:https://doi.org/10.54097/et0yen43
8. The impact of malicious nodes on the spreading of false information / Z. Ruan [et al.] // Chaos: An Interdisciplinary Journal of Nonlinear Science. 2020. № 30. P. 083101. DOI:https://doi.org/10.1063/5.0005105
9. Satija T., Kar N. Detecting Malicious Twitter Bots Using Machine Learning // Communications in Computer and Information Science. 2020. P. 182–194. DOI:https://doi.org/10.1007/978-981-15-3666-3_16
10. Wesam H.A., Ragheed A., Yossra H.A. Opinion mining for fake recommendations in e-commerce: A machine learning approach using LightGBM // AIP Conference Proceedings. 2025. № 3169. Vol. 030015. P. 1–11. DOI:https://doi.org/10.1063/5.0255957
11. Minakov S.S., Mihajlenko N.V. Problemy obespecheniya dostovernosti tekhnicheskih dannyh i svedenij, sopryazhyonnyh s vyyavleniem i rassledovaniem incidentov i prestuplenij, sovershyonnyh s ispol'zovaniem informacionno-telekommunikacionnyh tekhnologij // Vestnik ekonomicheskoj bezopasnosti. 2023. № 6. S. 107–112. DOI:https://doi.org/10.24412/2414-3995-2023-6-107-112
12. Kozlov V.V., Lagun A.V., Harchenko V.A. Obosnovanie oblika sistemy zashchity startovogo kompleksa ot destruktivnyh vozdejstvij // Izvestiya TulGU. Tekhnicheskie nauki. 2023. № 1. DOI:https://doi.org/10.24412/2071-6168-2023-1-259-266
13. Lubencov A.V. Sintez metoda ocenki effektivnosti sistemy informacionnoj bezopasnosti // Izvestiya vuzov. Elektronika. 2024. Vol. 29. № 1. P. 118–129. DOI:https://doi.org/10.24151/1561-5405-2024-29-1-118-129
14. Karmanova N.A. Metod kompleksirovannoj obrabotki informacii dlya dostizheniya dostovernosti dannyh v cifrovyh sensornyh sistemah // Informaciya i kosmos. 2025. № 2. S. 77–85.
15. Tymchuk A.I. Informacionnaya sistema kontrolya dostovernosti dannyh priborov uchyota v avtomatizirovannoj informacionno-izmeritel'noj sisteme kontrolya i uchyota elektroenergii // Mezhdunarodnyj nauchno-issledovatel'skij zhurnal. 2024. № 6 (144). S. 1–9. DOI:https://doi.org/10.60797/IRJ.2024.144.79
16. Lebedev I.S. Adaptivnoe primenenie modelej mashinnogo obucheniya na otdel'nyh segmentah vyborki v zadachah regressii i klassifikacii // Informacionno-upravlyayushchie sistemy. 2022. № 3 (118). S. 20–30. DOI:https://doi.org/10.31799/1684-8853-2022-3-20-30
17. Efimov A.Yu. Ispol'zovanie entropijnyh harakteristik setevogo trafika dlya opredeleniya ego anomal'nosti // Programmnye produkty i sistemy. 2021. T. 34. C. 83–90. DOI:https://doi.org/10.15827/0236-235X.133.083-090
18. Kupriyanov V.V. Teoreticheskoe obosnovanie vozmozhnosti snizheniya poter' informacii pri izmereniyah nepreryvnyh sluchajnyh velichin pri nalichii shumov // Gornyj informacionno-analiticheskij byulleten'. 2021. № 8. S. 70–79. DOI:https://doi.org/10.25018/0236-1493-2021-8-0-70
19. Lotka A. Elements of Physical Biology. Baltimore, 1925. 460 p.
20. Vol'terra V. Matematicheskaya teoriya bor'by za sushchestvovanie. M.: Nauka, 1976. 288 s.
21. Karmanova N.A. Algoritm dlya realizacii metoda kompleksirovannoj obrabotki dannyh s cel'yu formirovaniya i predostavleniya dostovernoj informacii // Nauchno-analiticheskij zhurnal «Vestnik Sankt-Peterburgskogo universiteta GPS MCHS Rossii». 2025. № 1. S. 160–173. DOI:https://doi.org/10.61260/2218-13H-2025-1-160-173




