Professional Documents
Culture Documents
secure Internet
1. Technical Concept
Motivation: As people require to network in society, we are more dependent on social
media than ever before. While people use social networks, rumors can mislead users into
believing wrong information. At the same time, the presence of many rumors on social
networks has become a global risk [1]. All kinds of topical events are fermented in real-time
on social media, giving rise to personal speculation and misinformation. These personal
speculations and misinformation can distort the course of events and cause unnecessary fear
among the uninformed [2].
The rise of social media in life has led to a shift in the venue of information warfare to
social networks. As a security issue, the threat from rumors must be identified as soon as
possible. The rumors must be anticipated and contained as early as possible in the safest,
best-case scenario. In the context of military operations, rumors will impact the support of
combat teams in public opinion. At the same time, when the military uses force in operations,
it will also act on the psychology of soldiers and eliminate the influence of the hostile power
due to the spread of rumors. Hostile forces usually use rumors to spread disinformation to
guide public opinion, then act in the direction of public opinion and generate responsibility
for the action, ultimately causing irreversible adverse social effects. This use of the media
environment to influence and control public opinion is transforming into the core of
information warfare. By identifying rumors, it is possible to better distinguish if some rumors
in the information war are coming from foreign governments.
During the modernization of military equipment, warfighter equipment has also been
greatly enhanced. To ensure that the messages soldiers receive from social media are
accurate, we will use secure IoT devices as an intermediate layer between social networks
and soldiers to identify and filter rumor messages. To improve the security and usability of
the devices, we will use low-power, high-performance, secure IoT devices. We will also use a
deep reinforcement learning model developed in the device to detect rumors in real-time. The
device will be developed independently of the Warfighter device and can be deployed to the
battlefield faster to address potential rumor threats.
Therefore, it is necessary to use deep neural learning algorithms and security IoT devices
to detect rumors online in real-time. High-precision, real-time objective analysis of rumors
spreading early in an event and immediate containment at the early stages of their spread can
effectively aid in developing cybersecurity.
Innovation: Different modeling approaches can be taken to analyze social media output.
Artificial Intelligence offers an extensive array of different methods to achieve this. Deep
learning and neural networks have proven to be highly reliable and accurate. For example,
machine learning approaches use training to recognize patterns within the data and can return
accurate results from relevant queries. Another branch of machine learning, natural language
processing, is a model specifically designed for understanding and processing human
language, making it an excellent model for analyzing users' social media posts.
In previous research conducted by other researchers, the datasets used were mainly binary
classifications (rumors, non-rumors [1]). In contrast, the methods used were centered around
deep learning and machine learning, effectively dealing with datasets with only binary labels
. In this research, to fill in the gaps and shortcomings of previous research and to better
[3]
define a rumor, it is necessary to exploit the dependencies between multiple labels in the
dataset, so we look at complex datasets with multi-label classification.
To process the complex dataset, we use DRL models and compare them to a sample of
social participants to make Example-based and Label-based evaluations of the model. To
better trace rumor data, we introduce an LSTM-based DRQN model with time series, under
which consideration of event sequences is added. The publication of rumors can also be
accurately traced in the early stages of hot events.
While current advances in cyber information security, such as passwords and data
protection algorithms, have increased trust in information processing, cyber security is more
than securing passwords and data [4]. Internet rumors are also one of the ways that hackers can
execute various cyber-attacks. Since we develop secure IoT devices that will operate
independently of warfighter devices and are not connected to the network, we only use secure
IoT to get social media information from the server and complete localized, real-time
detection. This means that secure IoT devices can better avoid cyber-attacks.
Therefore, it is necessary to use Deep Reinforcement Learning algorithms and secure the
Internet of Things to detect online rumors in real-time. By objectively analyzing rumors
spread in the early stages of an event with high accuracy and in real-time and instantly
containing them in the early stages of their spread, it can effectively help the development of
cyber security.
References
1. Islam, M.R., Liu, S., Wang, X. and Xu, G., 2020. Deep learning for misinformation detection on online social
networks: a survey and new perspectives. Social Network Analysis and Mining, 10(1), pp.1-20.
2. Kar, D., Bhardwaj, M., Samanta, S. and Azad, A.P., 2020, October. No rumors please! a multi-indic-lingual approach
for COVID fake-tweet detection. In 2021 Grace Hopper Celebration India (GHCI) (pp. 1-5). IEEE.
3. Hernandez-Suarez, A., Sanchez-Perez, G., Toscano-Medina, K., Martinez-Hernandez, V., Perez-Meana, H., Olivares-
Mercado, J. and Sanchez, V., 2018. Social sentiment sensor in Twitter for predicting cyber-attacks using ℓ1
regularization. Sensors, 18(5), p.1380.
4. Varshney, D. and Vishwakarma, DK, 2021. A review on rumor prediction and veracity assessment in online social
network. Expert Systems with Applications, 168, p.114208.
5. Catania, L.J., 2020. Foundations of Artificial Intelligence in Healthcare and Bioscience: A User Friendly Guide for IT
Professionals, Healthcare Providers, Researchers, and Clinicians. Academic Press.
6. Campan, A., Atnafu, T., Truta, T.M. and Nolan, J., 2018, December. Is data collection through twitter streaming API
useful for academic research?. In 2018 IEEE international conference on big data (Big Data) (pp. 3638-3643). IEEE.
7. Hassan, W.H., 2019. Current research on Internet of Things (IoT) security: A survey. Computer networks, 148, pp.283-
294.