Vol. 43 No. 4 (2013)
ECONOMIC SOCIOLOGY AND DEMOGRAPHY

Analysis of Blogs, Forums, Social Networking sites to Identify the Sources of Information Attacks in real Time

T. Ignatova
ООО «Медиалогия», Москва
Bio
V. Ivichev
ООО «Медиалогия», Москва
Bio
F. Khusnoyarov
ООО «Медиалогия», Москва
Bio

Published 2019-03-26

Keywords

  • SOCIAL MEDIA,
  • BOTNET,
  • INFORMATION ATTACKS

How to Cite

1.
Ignatova Т, Ivichev В, Khusnoyarov Ф. Analysis of Blogs, Forums, Social Networking sites to Identify the Sources of Information Attacks in real Time. ECO [Internet]. 2019 Mar. 26 [cited 2024 Nov. 22];43(4):181-5. Available from: https://ecotrends.ru/index.php/eco/article/view/2160

Abstract

Todays Internet impossible to imagine without social media. Government officials, business, government and civil organizations, the opposition and citizens to use them as a tribune. Unfortunately, this tribune can be used to spread disinformation, and even hostile propaganda on a massive scale. In this paper we show how vulnerable are the social media to the infiltration of botnets to carry out information attacks.

References








1.

Работа выполнена при финансовой поддержке Министерства образования и науки Российской Федерации. УДК 004.031.42.





2.

Web-платформы, обеспечивающие социальную деятельность пользователей. Пользователь социальной медиа владеет учетной записью, описывающий его социальные атрибуты, такие как имя, пол, интересы и контактную информацию.





3.

Vargas J.A. Obama raised half a billion online. URL: http://voices.washingtonpost.com/44/2008/11/obama-raised-half-a-billion-on.html, November 2008.





4.

Salem F. and Mourtada R. Civil movements: The impact of Facebook and Twitter//The Arab Social Media Report. -2011. -1(2).





5.

Misener D. Rise of the socialbots: They could be inuencing you online. URL: http://www.cbc.ca/news/technology/story/2011/03/29/f-vp-misener-socialbot-armies-election.html, March 2011.





6.

Ratkiewicz J., Conover M., Meiss M., Gon_calves B., Patil S., Flammini A. and Menczer F. Truthy: mapping the spread of astroturf in microblog streams. In Proceedings of the 20th international conference companion on World wide web, WWW 11. Р. 249{252, New York, USA, 2011. ACM.





7.

Stringhini G., Kruegel C. and Vigna G. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 10, pages 1(9), New York, USA, 2010. ACM.





8.

Stein T., Chen E. and Mangla K. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems, SNS 11. Р. 8:1(8:8), New York, USA, 2011. ACM.