OPPORTUNITY PROTECTION PUTEM MONITORING THREAT SOCIAL NETWORKS
https://doi.org/10.53360/2788-7995-2023-1(9)-4
Abstract
Currently, every second inhabitant of the planet is registered in Vkontakte, Whatsapp, Instagram, Skype, Periscope and other social networks. Worst of all, social media can also endanger human life. In many cases, illicit trafficking in drugs and psychotropic substances can spread through these social networks, so special attention should be paid to studying the problems of trust in information in the virtual space.
Since social network analysis is a field that is practiced all over the world, it is not surprising that there are many programs, as well as the creation of a system using the Python programming language, which analyzes texts in various subject areas that our society needs and tries to monitor the entire virtual world. We can achieve this goal by introducing the necessary algorithms into a special program.
In order to detect and prevent illegal actions, it was considered to organize the monitoring of social networks and the prevention of crimes organized via the Internet by creating software for monitoring social networks.
The article discusses the types of cyber threats and methods of protection against them, as well as a program for monitoring social networks in the Python environment and shows its results. Based on the results obtained, he considered the possibility of prevention by identifying types of threats.
Keywords
About the Authors
G. E. ZhidekulovaKazakhstan
candidate of technical sciences, associate professor Department of Information Systems,
Taraz. 7 Suleimenov St.
A. D. Abduvalova
candidate of technical sciences, associate professor Department of Information Systems,
Taraz. 7 Suleimenov St.
S. B. Bekbolatov
Master of Technical Sciences Department of Information Systems,
Taraz. 7 Suleimenov St.
References
1. Churakov A.N. Analysis of social networks // Sociological research. 2001. – No. 1. – pp. 109- 121. (in Russian).
2. Lukatsky A.V. Attack detection systems // Banking technologies. 1999. – No. 2. (in Russian).
3. Yablochkin A.S., Koshkin A.P. Modern directions of research in the field of strategic information security // National Security / nota bene. – 2019. – No. 5. – S. 34-47. DOI: 10.7256/2454- 0668.2019.5.31224 URL: https://nbpublish.com/library_read_article.php?id=31224. (in Russian).
4. Mironov K.V., Sharabyrov I.V. On the application of the support vector machine in attack detection systems // Mavlyutov Readings: All-Russian Youth Scientific Conference: a collection of works in 5 volumes. T. 3. – UGATU, 2012. – S. 28-30. (in Russian).
5. Yablochkin A.S., Koshkin A.P. Features of the national information security policy in the context of globalization // Security Issues. – 2019. – No. 5. – P. 16-31. DOI: 10.25136/2409- 7543.2019.5.31126 URL: https://e-notabene.ru/nb/article_31126.html. (in Russian).
Review
For citations:
Zhidekulova G.E., Abduvalova A.D., Bekbolatov S.B. OPPORTUNITY PROTECTION PUTEM MONITORING THREAT SOCIAL NETWORKS. Bulletin of Shakarim University. Technical Sciences. 2023;(1(9)):28-36. (In Kazakh) https://doi.org/10.53360/2788-7995-2023-1(9)-4