Next Article in Journal
Robust Consensus Modeling: Concerning Consensus Fairness and Efficiency with Uncertain Costs
Previous Article in Journal
Numerical Analysis for Sturm–Liouville Problems with Nonlocal Generalized Boundary Conditions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multidimensional Model of Information Struggle with Impulse Perturbation in Terms of Levy Approximation

by
Anatolii Nikitin
1,2,
Svajonė Bekešienė
3,
Šárka Hošková-Mayerová
4,* and
Bohdan Krasiuk
1
1
Department of Economics, The National University of Ostroh Academy, UA-03580 Ostroh, Ukraine
2
Faculty of Natural Sciences, Jan Kochanowski University, Stefana Żeromskiego 5, 25-369 Kielce, Poland
3
Research Group on Logistics and Defence Technology Management, General Jonas Zemaitis Military Academy of Lithuania, Silo 5a, 10322 Vilnius, Lithuania
4
Department of Mathematics and Physics, University of Defence, 66210 Brno, Czech Republic
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(8), 1263; https://doi.org/10.3390/math12081263
Submission received: 29 February 2024 / Revised: 30 March 2024 / Accepted: 6 April 2024 / Published: 22 April 2024

Abstract

:
The focus of this research was on building a decision support system for a model that characterizes the conflict interaction of n-dimensional complex systems with non-trivial internal structures. The interpretation of the new model was focused on information warfare as the impact of rare events that quickly change certain perceptions of a large number of people. Consequently, the support for various ideas experiences stochastic jumps, a phenomenon observable through a non-classical Levy approximation scheme. The essence of our decision support system lies in its ability to navigate the complex dynamics of conflict interaction among multifaceted systems. Through the utilization of advanced modeling techniques, our aim is to illuminate the complicated interplay of factors influencing information warfare and its cascading effects on societal perceptions and behaviors. Key components of our decision support system encompass model development, simulation capabilities, data integration, and visualization tools. The significance of our work lies in its potential to inform policy formulation, conflict resolution strategies, and societal resilience in the face of information warfare. By providing decision-makers with actionable intelligence and foresight into emerging threats and opportunities, our decision support system serves as a valuable tool for navigating the complexities of modern conflict dynamics. In conclusion, developing a decision support system for modeling conflict interaction in complex systems represents an essential step toward enhancing our understanding of information warfare and its consequences. Through interdisciplinary collaboration and innovative modeling techniques, we aim to provide stakeholders with the insights and capabilities needed to navigate the developing landscape of conflict and ensure the stability and resilience of society.

1. Introduction

The objective of an information threat is to compromise the integrity, confidentiality, or availability of information, thereby causing harm to individuals, organizations, or states [1]. It is evident that these threats require effective mitigation strategies. In the context of information warfare, adversaries may exploit information threats to discredit opponents, undermine public trust in specific entities, or even manipulate election processes. Information threats manifest in various forms within the realm of information warfare. In order to counter information threats effectively, it is imperative to develop robust security measures [2]. Primarily, this involves the construction of mathematical models that consider a multitude of factors capable of influencing the evolving situation.
The Lotka-Volterra model, which describes predator-prey interactions, is one of the main types of models of many processes in applied mathematics, social sciences, and economics [1,3,4,5,6]. The classical Lotka-Volterra model, well-known for its applications in predator-prey interactions, encounters significant limitations when applied to the dynamics of information dissemination. One of the primary drawbacks of this model lies in its inability to accommodate the dynamic nature of information influence. Specifically, the model assumes constancy in the characteristics (intensities) of information impact, failing to account for sudden and unpredictable events that profoundly affect the perceptions of information consumers Other approaches to modeling the spread of information are models of population dynamics, in particular, Gompertz dynamics, which are exponential at small moments of time and pass to some asymptotic level at large moments of time [7,8,9], game models [10] or models described by linear partial equations derivatives [11]. However, in real-world scenarios, the dissemination of information is characterized by volatility and unpredictability, influenced by a myriad of factors such as breaking news, viral content, and social media trends. The model’s static nature precludes it from capturing the nuanced dynamics of information dissemination in contemporary society [12,13,14].
Considering this gap, the construction and analysis of a new model of information warfare take into account both frequent events that occur with high probabilities and rare ones that quickly change some beliefs of a large number of people. As a result, the quantities of adherents of different ideas make stochastic jumps that we may see applying the Levy approximation scheme. We suppose that such a model could be essential as soon as now breaking news produces quick and astonishing influence on the audience through social media and the Internet or TV channels. The behavior of the model could not be analyzed obviously for any fixed moment of time as it was done in a classical case. But, as it is usual for stochastic models, we may obtain functional limit theorems that present the behavior at large time intervals [14,15,16,17,18,19]. In order to streamline the decision-making process and facilitate result visualization, a software implementation was developed for the described process. JetBrains PyCharm Community Edition 2023.3 software, along with the Matplotlib 3.6.2 library calculation visualization package, was selected as the programming language for this purpose. Additionally, it was decided not to utilize off-the-shelf solutions for the primary calculations, thus ensuring complete control over the construction of the numerical solution.
Hence, this study introduces several innovative contributions. Primarily, it presents a multi-dimensional model of information warfare that incorporates the influence of random factors, offering a more comprehensive understanding of the dynamics of information conflicts. Secondly, a software decision support system was developed based on the analyzed stochastic system. This system enables real-time construction, analysis, and management of various information scenarios, providing decision-makers with valuable insights for effective response strategies.

2. Model of Information Warfare

The application of this approach to the model of information warfare was initially proposed in [1]. The authors conceptualize a specific social community characterized by a constant population size denoted as N 0 , which faces potential exposure to various types of information threats. The values N 1 t , N 2 t , , N n t are the number of “supporters” depending on time t who have perceived new information, ideas, norms, etc. of type 1,2 , , n respectively.
In the “classical” version, the model is described by the Lotka-Volterra equations:
d N 1 d t = α 1 + β 1 N 1 t N 0 N 1 t N 2 t N n t ,   N 1 t 0 = 0 = N 1 0 0 d N 2 d t = α 2 + β 2 N 2 t N 0 N 1 t N 2 t N n t ,   N 2 t 0 = 0 = N 2 0 0 d N n d t = α n + β n N n t N 0 N 1 t N 2 t N n t ,   N n t 0 = 0 = N n 0 0
Key assumptions about the model (1):
  • There are multiple concepts and n ideas that are disseminated among the community through 2 information channels:
    • the first is “external” to the community, for example, an advertising media campaign. Its intensity is characterized by the parameters α 1 > 0 , α n > 0 , respectively, and the parameters α i , i = 1 , , n are considered independent of time and environment;
    • the second “internal” channel is the interpersonal communication between members of the social community (its intensity, i.e., the number of equivalent information contacts characterized by the parameters β 1 > 0 , , β n > 0 , respectively, which also do not depend on time and environment). As a result, supporters of the first idea who have already been “recruited” (their number is equal to N 1 t ) make their contribution to the process of spreading the idea among the community by influencing its “unrecruited” members (their number is equal to N 0 N 1 t N 2 t N n t ). The same applies to supporters of other ideas.
  • The rate of change of the number of supporters N 1 t , N n t (i.e., the number of supporters of the respective idea “recruited” per unit of time) consists of:
    • the external recruitment rate (proportional to the product of intensities α 1 , , α n by the number of individuals not yet recruited N 0 N 1 t N 2 t N n t ), i.e.,
      α 1 ( N 0 N 1 ( t ) N 2 ( t ) N n ( t ) ) α 2 ( N 0 N 1 ( t ) N 2 ( t ) N n ( t ) ) α n ( N 0 N 1 ( t ) N 2 ( t ) N n ( t ) )
      accordingly; internal rate of recruitment (it is proportional to the product of intensities β 1 , β 2 , , β n by the corresponding number of active supporters N 1 t , N 2 t , , N n t and the number of unrecruited N 0 N 1 t N 2 t N n t , i.e.,
      β 1 N 1 ( t ) ( N 0 N 1 t N 2 t N n t ) β 2 N 2 t N 0 N 1 t N 2 t N n t , β n N n t N 0 N 1 t N 2 t N n t ,
      accordingly; thus, the model can be described by equations (1) of the Lotka-Volterra type (for more details on possible solutions and characteristics of the dynamic system, see [5]).

3. Model of Information Warfare with Impulse Influence and Markov Switches

We extend the approach to building an information warfare model proposed in [1] to the multidimensional case:
d N ε ( t ) = C ( N ε ( t ) , x ( t / ε 2 ) ) d t + d η ε ( t )
where,
C N ε t , x t ε 2 = = α 1 x + β 1 x N 0 β 1 x N 1 ε t α 1 x β 1 x N 1 ε t α 2 x β 2 x N 2 ε t α 2 x + β 2 x N 0 β 2 x N 2 ε t α n x β n x N n ε t α n x β n x N n ε t α 1 x β 1 x N 1 ε t α 1 x β 1 x N 1 ε t α 2 x β 2 x N 2 ε t α 2 x β 2 x N 2 ε t α n x β n x N n ε t α n x + β n x N 0 β n x N n ε t × N 1 ε t N 2 ε t N n ε t + α 1 N 0 α 2 N 0 α n N 0 ,
where
(A)
N ε t is an n -dimensional vector of solutions, the components of which are the numbers of supporters of different ideas;
(B)
x t / ε 2 is a uniformly ergodic Markov process that models the influence of the environment on the intensity of information dissemination. This means that in the period between the moments of resumption of such a Markov process, the values of α 1 x , α 2 x , , α n x , β 1 x , β 2 x , , β n x are constant, as in the classical model, while at the moments of resumption the values change instantly. This models random events that occur independently of society and have a significant impact on people’s views.
The Markov random process x t / ε 2 is defined in the standard phase space X , X , which is given by the generator [14,15,16,17].
Q φ ( x ) = q ( x ) X P ( x , d y ) [ φ ( y ) φ ( x ) ]
on the Banach space B X of bounded functions with real values and a supremum norm
| | φ ( x ) | | = s u p x X | φ ( x ) |
The stochastic kernel P x , B , x X , B X defines a uniformly ergodic nested Markov chain x n = x τ n , n 0 , where τ n are the jump moments of the nested chain, which has a stationary distribution ρ B , x X , B X . The stationary distribution π B , B X , of the Markov process x t , t 0 can be determined from the relation [18]
π ( d x ) q ( x ) = q ρ ( d x )
where
q = X π ( d x ) q ( x )
Let us define the potential operator R 0 for the generator Q using the relation
R 0 = Π ( Π + Q ) 1
in which Π φ x = X Π d y φ y is a projector onto the subspace N Q = φ : Q φ = 0 of the zeros of the operator Q .
The impulsive perturbation process (IPP) [14,16,18,20,21] η ε t , t 0 , which components under the Levy approximation scheme is given by
η i ε ( t ) = 0 t η i ε d s , x ε s ε 2 ,   i = 1 , , n
where the set of processes with independent increments η i ε t , x , t 0 , x X , is determined by the generators
Γ ε ( x ) φ ( w ) = ε 2 R ( φ ( w + v ) φ ( w ) ) Γ ε ( d v , x ) , x X
and satisfy the conditions of the Levy approximation.
L1: Approximation of averages:
R v Γ ε d v , x = ε a 1 x + ε 2 a 2 x + θ a x , θ a x 0 , ε 0
and
R v 2 Γ ε d v , x = ε 2 b x + θ b x , θ b x 0 , ε 0
L2: Condition on the distribution function:
R g v Γ ε d v , x = ε 2 Γ g x + θ g x , θ g x 0 , ε 0
for all g v C 3 R . Here, the measure Γ g x is bounded for all g v C 3 R and is defined by the relation
Γ g x = R g v Γ 0 d v , x , g v C 3 R
where C 3 R is a class of functions that define a measure and contains bounded functions with real values such that g v / v 2 0 when v   0 .
L3: Uniform quadratic integrability:
lim c s u p x X | v | > c v 2 Γ 0 ( d v , x )

4. Asymptotic Model Analysis

Let’s assume that the balance condition is met
a ^ 1 : = X π ( d x ) a 1 ( x ) = 0
We present the asymptotic properties of the impulsive perturbation process obtained in [18].
Theorem 1.
If the balance condition (3) and the Levy approximation conditions L1–L3 are satisfied, then there is a weak convergence
η ε t η 0 t , ε 0
The limit process  η 0 t  is determined by the generator
Γ φ w = a ^ 2 φ w + 1 2 σ 2 φ w + R φ w + v φ v Γ ^ 0 d v
where
a ^ 2 = X π d x a 2 x a 0 x
σ 2 = X π d x b x b 0 x + 2 X π d x a 1 x R 0 a 1 x
a 0 x = R v Γ 0 d v , x , b 0 x = R v 2 Γ 0 d v , x , Γ 0 ^ v = X π d x Γ 0 v , x
Thus, in the limit, we have obtained a Levy process with three components: a deterministic shift, a diffusion component, and a Poisson jump part.
Proof. 
Since more general statements were already proved by us earlier [18], for our model (2), we will present the main stages of the proof with more detailed explanations in the proof of Theorem 2 for the entire dynamic system.
As we know [14], generators of processes with independent increments η ε ( t , x ) , t 0 , x X , on test functions φ ( ω ) C 3 ( R ) under conditions L1–L3 admit the asymptotic representation
Γ ε ( x ) φ ( ω ) = ε 1 Γ 1 ( x ) φ ( ω ) + Γ 2 ( x ) φ ( ω ) ,
where
Γ 1 ( x ) φ ( ω ) = a 1 ( x ) φ ( ω ) , Γ 2 ( x ) φ ( ω ) = ( a 2 ( x ) a 0 ( x ) ) φ ( ω ) + 1 2 ( b ( x ) b 0 ( x ) ) φ ( ω ) + + R [ φ ( ω + v ) φ ( v ) ] Γ 0 ( d v , x ) .
It is also a well-known fact [14] that the generator of the two-component Markov process ( η ε , x ( t / ε 2 ) ) , t 0 has the form
Γ ^ ε ( x ) φ ( ω , x ) = ε 2 Q φ ( ω , x ) + ε 1 Γ 1 ( x ) φ ( ω , x ) + + Γ 2 ( x ) φ ( ω , x ) + γ ε ( x ) φ ( ω , x ) ,
where the remainder term γ ε ( x ) φ ( ω , x ) 0 at ε 0 , φ ( ω , ) C 3 ( R ) .
Let us consider the so-called truncated generator:
Γ 0 ε ( x ) φ ( ω ) = ε 2 Q φ ( ω , x ) + ε 1 Γ 1 ( x ) φ ( ω , x ) + Γ 2 ( x ) φ ( ω , x ) .
When the balance condition (3) is fulfilled, the solution of the singular perturbation problem for the truncated operator Γ 0 ε ( x ) on the test functions
φ ε ( ω , x ) = φ ( ω ) + ε φ 1 ( ω , x ) + ε 2 φ 2 ( ω , x )
is realized by the relation [14]
Γ 0 ε ( x ) φ ε ( ω , x ) = Γ φ ( ω ) + ε θ η ε ( x ) φ ( ω ) ,
where the residual term θ η ε ( x ) φ ( ω ) is uniformly bounded at x .
The limit operator is determined by the formula
Γ = Π Γ 1 ( x ) R 0 Γ 1 ( x ) Π + Π Γ 2 ( x ) Π .
and applying Theorem 6.3 from [14], we obtain the necessary convergence of processes, i.e., the statement of the Theorem 1. □
Next, we are ready to study the asymptotic properties of the dynamical system, in particular, using the approaches proposed in [14,18].
Theorem 2.
When the balance condition (3) and Levy approximation conditions L1–L3 are satisfied, weak convergence in the sense of generator convergence is valid
u ε t , η ε t u 0 t , η 0 t , ε 0
The limit process is determined by the generator
L φ w , v = C ^ u φ w , + Γ φ x
The averaged function has the form
C ^ ( u ) = X π ( d x ) C ( u , x )
Proof. 
As it was established in the monograph [14], the generator of the two-component Markov process ( u ε ( t ) , x ( t / ε 2 ) ) , t 0 , can be written in the form
L ε ( x ) φ ( ω , x ) = ε 2 Q φ ( ω , x ) + Γ ε ( x ) φ ( ω , x ) + + C ( x ) φ ( ω , x ) + θ ω ε φ ( ω , x )
where
C ( x ) φ ( ω , x ) = C ( u , x ) φ ω ( ω , x )
and θ ω ε ( x ) φ ( ω , x ) 0 at ε 0 .
The generator L ε ( x ) in the case of an impulse perturbation process of admits an asymptotic representation [14]
L ε ( x ) φ ( ω , x ) = ε 2 Q φ ( ω , x ) + ε 1 Γ 1 ( x ) φ ( ω , x ) + + Γ 2 ( x ) φ ( ω , x ) + C ( x ) φ ( ω , x ) + θ ^ ω ε φ ( ω , x )
where
θ ^ ω ε ( x ) = γ ε + θ ω ε ( x ) ,
Γ 1 ( x ) φ ( ω ) = a 1 ( x ) φ ( ω ) ,
Γ 2 ( x ) φ ( ω ) = ( a 2 ( x ) a 0 ( x ) ) φ ( ω ) + 1 2 ( b ( x ) b 0 ( x ) ) φ ( ω ) + + R [ φ ( ω + v ) φ ( v ) ] Γ 0 ( d v , x ) .
Remainder term θ ^ ω ε ( x ) φ ( ω , x ) 0 at ε 0 .
We apply the truncated operator of the form:
L 0 ε ( x ) φ = ε 2 Q φ + ε 1 Γ 1 ( x ) φ + Γ 2 ( x ) φ + C ( x ) φ
Taking into account the fulfillment of the balance condition (3), we will solve the singular perturbation problem for the truncated operator (5) on the test functions
φ ε ( ω , x ) = φ ( ω ) + ε φ 1 ( ω , x ) + ε 2 φ 2 ( ω , x )
using relation
L 0 ε ( x ) φ ε ( ω , x ) = L φ ( ω ) + ε 2 θ ω ε ( x ) φ ( ω )
where remainder term θ ω ε ( x ) is uniformly bounded at x .
The limit operator L is given by the formula
L = Π [ C ( x ) + Γ 1 ( x ) R 0 Γ 1 ( x ) + Γ 2 ( x ) ] Π
Indeed, in order to fulfill equality (6), it is necessary that the coefficients with the same powers of ε on the left and right sides are equal. For this purpose, we calculate:
L 0 ε ( x ) φ ε ( ω , x ) = ε 2 Q ( x ) φ ( ω ) + + ε 1 [ Q φ 1 ( ω , x ) + Γ 1 ( x ) φ ( ω ) ] + + [ Q φ 2 ( ω , x ) + Γ 1 ( x ) φ 1 ( ω , x ) + + Γ 2 ( x ) φ + C ( x ) φ ( ω ) ] + + ε [ Γ 1 ( x ) φ 2 ( ω , x ) + Γ 2 ( x ) φ 1 ( ω , x ) + C ( x ) φ 1 ( ω , x ) ] + + ε 2 [ Γ 2 ( x ) φ 2 ( ω , x ) + C ( x ) φ 2 ( ω , x ) ]
Since
Q φ ( ω ) = 0 φ ( ω ) N Q ,
Then φ ( ω ) not depends from x .
The balance condition (3) is a condition for the solvability of the equation
Q φ 1 ( ω , x ) + Γ 1 ( x ) φ ( ω ) = 0
Then,
φ 1 ( ω , x ) = R 0 Γ 1 ( x ) φ ( ω ) ,
and
Q φ 2 ( ω , x ) + Γ 1 ( x ) φ 1 ( ω , x ) + + Γ 2 ( x ) φ ( ω ) + C ( x ) φ ( ω ) = L φ ( ω ) .
or
Q φ 2 ( ω , x ) = [ L Γ 1 ( x ) R 0 Γ 1 ( x ) Γ 2 ( x ) C ( x ) ] φ ( ω )
The solvability condition of the last equation gives the limit operator L in the form (7). Applying Theorem 6.3 from [14], we finally obtain the statement of the Theorem 2. □

5. Modeling and Software Implementation

In our formulation, the average marginal model of information warfare is outlined as follows: this model serves as a comprehensive framework for analyzing various facets of information warfare, encompassing a wide array of factors and dynamics. By examining the average marginal effects across different dimensions, we gain insights into the nuanced interplay between variables and their impact on the broader landscape of information threats. This model offers a structured approach to dissecting the complexities inherent in information warfare scenarios, enabling a deeper understanding of its underlying mechanisms and potential mitigation strategies. The proposed model formulation can be presented by Equation (4) with the matrix in the form (2) appearing and the assumptions described during the construction of the model, in particular (A) and (B), are fulfilled.
For the software implementation, the decision was made to utilize the Python language due to its versatility and extensive libraries. The visualization aspect was executed using the Matplotlib 3.6.2 library package, known for its effectiveness in creating clear and insightful graphical representations. Opting against pre-existing solutions for calculations provided us with greater flexibility in obtaining precise numerical solutions tailored to our specific requirements. Despite eschewing off-the-shelf solutions for fundamental calculations, Python (JetBrains PyCharm Community Edition 2023.3) offers a wealth of libraries that expedite the coding process for tasks such as generating numerical series according to the normal distribution law or handling operations with arrays and tabular data. Leveraging these libraries not only streamlines development but also ensures reliability and efficiency in our implementation.
Consider an example for six types of information threats. This scenario can apply to situations where some propaganda is distributed across different, for example, TV channels. Input parameters:
N 0 = 500000 ,   N 1 0 = 0 ,   N 2 0 = 0 ,   N 3 0 = 0 ,   N 4 0 = 0 ,   N 5 0 = 0 ,   N 6 0 = 0 , α 1 = 0.000012 ,   α 2 = 0.000014 ,   α 3 = 0.000011 ,   α 4 = 0.000015 ,   α 5 = 0.000013 ,   α 6 = 0.000011 , β 1 = 0.00000001 ,   β 2 = 0.00000002 ,   β 3 = 0.000000009 ,   β 4 = 0.00000002 ,   β 5 = 0.00000002 ,   β 6 = 0.00000001 .
Also, the following parameters were used to characterize the diffusion process: θ = 1 , σ = 5 . These values are used to calculate asymptotic standard deviation as part of the Euler-Maruyama method to get a numerical solution. By changing those values, we can increase or decrease the diffusion process’s deviation.
The characteristics of the jumps process are following λ = 5 ,   σ = 5 . Here, we are using a discrete jumps process, so λ is intensity of jumps and σ used to describe variability.
In this case, input parameters for the outer channel rely on TV channel ratings or the amount of auditory.
As depicted in Figure 1, the fourth type of information threat emerges as the predominant leader, attributed to its notably higher initial coefficients. However, it is noteworthy that during the initial stages, the leadership position was transiently held by other types of information threats, primarily due to the influence of random shifts. In real-world scenarios, such shifts may manifest as unexpected downtime or the dissemination of compromising information by certain TV channels.
It is pertinent to highlight that the magnitude of random disturbances, often referred to as “strength,” can be manipulated for experimental purposes. For instance, by augmenting parameters such as θ and σ to values of 4 and 8 respectively, the ensuing results are markedly affected. Notably (Figure 2), deviations exhibit a substantial increase under these augmented conditions.
As depicted in the graph (Figure 1), it is evident that the fourth type of information threat no longer maintains its status as the predominant contender. This observation underscores a critical insight: even when the combined significance of the α n and β n coefficients appears substantial, it may not guarantee decisive influence under certain conditions. The emergence of this outcome highlights the potential impact of robust random processes. These processes, characterized by their unpredictability and strength, possess the capacity to exert substantial influence on the dynamics of information dissemination. Consequently, even factors traditionally perceived as influential may be overshadowed or mitigated by the effects of these potent random processes. This realization underscores the importance of accounting for stochastic elements in modeling and analyzing information dissemination dynamics, as they can significantly alter expected outcomes and challenge conventional interpretations of influence and dominance.
In addition, we also consider the case where the same input parameters apply to all types of information threats.
N 0 = 500000 ,   N 1 0 = 0 ,   N 2 0 = 0 ,   N 3 0 = 0 ,   N 4 0 = 0 ,   N 5 0 = 0 ,   N 6 0 = 0 , α 1 = 0.000012 ,   α 2 = 0.000012 ,   α 3 = 0.000012 ,   α 4 = 0.000012 ,   α 5 = 0.000012 ,   α 6 = 0.000012 , β 1 = 0.00000001 ,   β 2 = 0.00000001 ,   β 3 = 0.00000001 ,   β 4 = 0.00000001 ,   β 5 = 0.00000001 ,   β 6 = 0.00000001
Upon reflection of the scenario outlined above, it becomes evident that one might anticipate an equal distribution of adherents across each type of information threat. However, due to the interplay of diffusion processes and sudden jumps, the resulting output becomes inherently unpredictable. The diffusion process, characterized by the gradual spread of information over time, interacts with stochastic jumps, which represent sudden, significant shifts in the number of adherents for specific ideas. As a result of these dynamic forces, the distribution of adherents among different types of information threats deviates from a uniform pattern, leading to unpredictable outcomes. This unpredictability is illustrated in Figure 3, where the fluctuating nature of the distribution highlights the complex dynamics at play in information dissemination.
Given the stochastic nature of the process, it is anticipated that subsequent simulations will yield varying results, even in the absence of alterations to the input parameters. This randomness stems from the inherent unpredictability of certain factors influencing the simulation, such as initial conditions or external variables. As a consequence, each simulation run may produce distinct outcomes, reflecting the inherent variability of the system being modeled. Therefore, the expectation of observing different results in successive simulations, even when input parameters remain unchanged, is a natural consequence of the inherent randomness inherent in the simulation process (Figure 4).

6. Conclusions

This article presents a comprehensive examination of the complexities involved in developing a model to address n-types of information threats while considering environmental variability. The primary aim is to assess the velocity of information threat dissemination and integrate it into the development of countermeasure strategies. By employing the Poisson approximation scheme, the model can differentiate between deterministic shifts and jumps in the limit process, thereby accommodating real-world nuances in information propagation.
Key findings from this study include the proposal of a multidimensional model that surpasses the classical approach in terms of generality and accuracy [22,23,24]. Moreover, explicit constructions of the limit generators of the impulse process and the dynamical system were achieved, facilitating a deeper understanding of the model’s behavior. Furthermore, the developed software solution streamlines calculations, enhancing the model’s practical applicability.
The proposed model offers significant advantages, notably in conducting precise and comprehensive analyses of information threat spread. Enabling accurate measurement of spread rates it empowers decision-makers to formulate more effective response strategies. Additionally, the model’s ability to analyze temporal changes in information threat spread facilitates trend identification and prediction of future threats.
In conclusion, the developed model represents a significant advancement in understanding and mitigating information threats. Its ability to account for environmental variability and accurately analyze information spread dynamics makes it a valuable tool for policymakers and security practitioners in devising proactive and effective response strategies. Further research and experimentation will continue to refine and validate the model’s performance in diverse contexts and scenarios.

Author Contributions

Conceptualization, A.N., S.B., Š.H.-M. and B.K.; methodology, A.N., S.B., Š.H.-M. and B.K.; formal analysis, A.N. and S.B.; investigation, A.N., S.B. and B.K.; writing—original draft preparation, A.N., S.B. and B.K.; writing—review and editing, A.N., S.B., Š.H.-M. and B.K.; project administration, Š.H.-M.; funding acquisition, Š.H.-M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No data associated with this research.

Acknowledgments

The authors thank the Ministry of Defence of the Czech Republic for the support via grant VAROPS.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Mikhailov, A.P.; Marevtseva, N.A. Models of information warfare. Math. Models Comput. Simul. 2012, 4, 251–259. [Google Scholar] [CrossRef]
  2. Gombár, M.; Vagaská, A.; Korauš, A.; Račková, P. Application of Structural Equation Modelling to Cybersecurity Risk Analysis in the Era of Industry 4.0. Mathematics 2024, 12, 343. [Google Scholar] [CrossRef]
  3. Stone, L.; Olinky, R. Phenomena in ecological systems. In Experimental Chaos 6th Experimental Chaos Conference; American Institute of Physics Inc.: Potsdam, Germany, 2003; pp. 476–487. [Google Scholar]
  4. Takahashi, K.I.; Salam, K.M.M. Mathematical model of conflict with non-annihilating multi-opponent. J. Interdiscip. Math. 2001, 9, 459–473. [Google Scholar]
  5. Tufto, J. Effects of releasing maladapted individuals: A demographic evolutionary model. Am. Nat. 2001, 158, 331–340. [Google Scholar] [CrossRef] [PubMed]
  6. Verhulst, P.F. Notice sur la loi que la population suit dans son accroissement. Corresp. Mathématique Phys. 1838, 10, 113–121. [Google Scholar]
  7. Nakonechnyi, A.G.; Zinko, P.N.; Zinko, T.P.; Shevchuk, Y.M. Guaranteed prediction estimates of solving systems of differential equations with Gompertz dynamics under observations at discrete time instants. J. Autom. Inf. Sci. 2019, 51, 38–53. [Google Scholar] [CrossRef]
  8. Mahjan, V.; Muller, E.; Bass, F.M. New product diffusion models in marketing: A review and directions for research. J. Mark. 1990, 54, 1–26. [Google Scholar] [CrossRef]
  9. Wu, F.-S.; Chu, W.-L. Diffusion models of mobile telephony. J. Bus. Res. 2010, 63, 497–501. [Google Scholar] [CrossRef]
  10. Jormakka, J.; Mölsä, J.V.E. Modelling Information Warfare as a Game. J. Inf. Warf. 2005, 4, 12–25. [Google Scholar]
  11. Chilachava, T.I. Mathematical Model of Information Warfare with System of Linear Partial Differential Equations. In Proceedings of the VIII International Conference of the Georgian Mathematical Union, Batumi, Georgia, 4 September 2017. [Google Scholar] [CrossRef]
  12. Bakare, E.A.; Hoskova-Mayerova, S. Numerical Treatment of Optimal Control Theory Applied to Malaria Transmission Dynamic Model. Qual. Quant. 2023, 57, 409–431. [Google Scholar] [CrossRef]
  13. Bakare, E.A.; Onasanya, B.O.; Hoskova-Mayerova, S.; Olubosede, O. Analysis of Control Interventions against Malaria in communities with Limited Resources. Analele Ştiinţifice Ale Univ. "Ovidius" Constanţa. Ser. Mat. 2021, 29, 71–91. [Google Scholar] [CrossRef]
  14. Korolyuk, V.S.; Limnios, N. Stochastic Systems in Merging Phase Space; World Scientific: Singapore, 2005; p. 330. [Google Scholar]
  15. Korolyuk, V.S.; Limnios, N.; Samoilenko, I.V. Lévy and Poisson approximations of switched stochastic systems by a semi-martingale approach. C. R. Mathématique 2016, 354, 723–728. [Google Scholar] [CrossRef]
  16. Jacod, J.; Shiryaev, A.N. Limit Theorems for Stochastic Processes; Springer: Berlin/Heidelberg, Germany, 2003. [Google Scholar]
  17. Korolyuk, V.S.; Korolyuk, V.V. Stochastic Models of Systems; Kluwer: Dordrecht, The Netherlands, 1999. [Google Scholar]
  18. Lotka, A.J. Relation between birth rates and death rates. Science 1907, 26, 21–22. [Google Scholar] [CrossRef] [PubMed]
  19. Nevel’son, M.B.; Has’minskii, R.Z. Stochastic Approximation and Recursive Estimation; Translation of Mathematical Monographs, 47; American Mathematical Society: Ann Arbor, MI, USA, 1976; p. 244. [Google Scholar]
  20. Samoilenko, I.V.; Nikitin, A.V. Differential Equations with Small Stochastic Terms Under the Lévy Approximating Conditions. Ukr. Math. J. 2018, 69, 1445–1454. [Google Scholar] [CrossRef]
  21. Chabanyuk, Y.; Nikitin, A.; Khimka, U. Asymptotic Analyses for Complex Evolutionary Systems with Markov and Semi-Markov Switching Using Approximation Schemes.-Monografia; Wiley-ISTE: Hoboken, NJ, USA, 2020; p. 240. ISBN 978-1-119-77973-5. [Google Scholar]
  22. Papanicolaou, G.; Stroock, D.; Varadhan, S.R.S. Martingale approach to some limit theorems. In Duke Turbulence Conference; Duke University Mathematics Series: Durham, NC, USA, 1977; Volume 3, p. 120. [Google Scholar]
  23. Rajchl, E.; Janda, J.; Sedlačík, M. Optimization of composition of water accepting scintillation cocktail. J. Radioanal. Nucl. Chem. 2022, 331, 3231–3240. [Google Scholar] [CrossRef]
  24. Odehnal, J.; Sedlačík, M. Political stability as determinant of terrorist attacks in developed and developing countries: An empirical multivariate classification analysis. In AIP Conference Proceedings; American Institute of Physics Inc.: Thessaloniki, Greece, 2018. [Google Scholar] [CrossRef]
Figure 1. Visualization of information warfare (shift, diffusion plus jumps).
Figure 1. Visualization of information warfare (shift, diffusion plus jumps).
Mathematics 12 01263 g001
Figure 2. Visualization of information warfare at higher random deviations.
Figure 2. Visualization of information warfare at higher random deviations.
Mathematics 12 01263 g002
Figure 3. Displaying a case with the same input parameters for each information threat.
Figure 3. Displaying a case with the same input parameters for each information threat.
Mathematics 12 01263 g003
Figure 4. Displaying a case with the same input parameters for each information threat, second simulation.
Figure 4. Displaying a case with the same input parameters for each information threat, second simulation.
Mathematics 12 01263 g004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Nikitin, A.; Bekešienė, S.; Hošková-Mayerová, Š.; Krasiuk, B. Multidimensional Model of Information Struggle with Impulse Perturbation in Terms of Levy Approximation. Mathematics 2024, 12, 1263. https://doi.org/10.3390/math12081263

AMA Style

Nikitin A, Bekešienė S, Hošková-Mayerová Š, Krasiuk B. Multidimensional Model of Information Struggle with Impulse Perturbation in Terms of Levy Approximation. Mathematics. 2024; 12(8):1263. https://doi.org/10.3390/math12081263

Chicago/Turabian Style

Nikitin, Anatolii, Svajonė Bekešienė, Šárka Hošková-Mayerová, and Bohdan Krasiuk. 2024. "Multidimensional Model of Information Struggle with Impulse Perturbation in Terms of Levy Approximation" Mathematics 12, no. 8: 1263. https://doi.org/10.3390/math12081263

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop