A method for modeling hybrid influence on government services using an agent-Based Approach

Authors

DOI:

https://doi.org/10.17721/ISTS.2025.9.47-53

Keywords:

Hybrid warfare, agent-based modeling, fake news, digital security, behavioral load

Abstract

Background. In the context of hybrid warfare, the role of information influence on critical infrastructure is growing. Fake news can trigger waves of user behavioral activity that mimic DDoS attacks, overloading government digital services even without direct technical interference. This creates the need to model such scenarios considering both technical and socio-behavioral factors.
Methods. An agent-based model of hybrid influence is proposed, including users, bots, fake news sources, and protective mechanisms. The model is implemented using mathematical expressions and scenario simulation, including a baseline scenario, delayed response scenario, technical intervention scenario, and official rebuttal scenario. The analysis considers system load parameters, behavioral activation probability, and the system's response.
Results. It was found that user behavior alone can generate critical system load equivalent to a DDoS attack. The most effective scenario combined technical blocking and information rebuttal, reducing load to a stable level. Classic cybersecurity models often fail to account for delayed reactions or wave-like behavioral patterns, limiting their effectiveness in hybrid environments.
Conclusions. The proposed model enables not only simulation of hybrid influence but also evaluation of response tactics. It can be applied in CERT platforms, Red Team / Blue Team exercises, and early-warning systems. Further research may focus on adapting the model to real-world environments and developing automated response mechanisms to information threats.

Downloads

Download data is not yet available.

References

Matteo, C., Walter, Q., Alessandro, G., Valensise, Carlo, M., Emanuele, B., Schmidt, Ana, L., Paola, Z., Zollo F. & Scala, A. (2020). The COVID-19 social media infodemic. Scientific Reports, 10, 16598. https://doi.org/10.1038/s41598-020-73510-5

Dhiman, D., Shah, R., Thirunarayan, K. (2024). Detecting fake news using a hybrid GBERT model. Procedia Computer Science, 217, 1427–1436. https://doi.org/10.1016/j.procs.2022.12.341

ENISA. (2023). Threat Landscape for Disinformation Campaigns. European Union Agency for Cybersecurity. https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-disinformation-campaigns

Glenski, M., Weninger, T., & Volkova, S. (2018). Identifying and understanding user reactions to deceptive and trusted social news sources. In K. Bharat, R. Jim, & G. Kathleen (Eds.). Proceedings of the 27th ACM International Conference on Information and Knowledge Management (pp. 1063–1072). Association for Computing Machinery. https://doi.org/10.1145/3269206.3271774

Kotenko, I., Stepashkin, M., & Doynikova, E. (2008). Agent-based modeling and simulation of botnets and botnet defense. In А. Smith, & B. Johnson (Eds.). Proceedings of the 2008 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing (pp. 71–78). IEEE Press. https://doi.org/10.1109/PDP.2008.71

David M. J., Lazer, Matthew A., Baum, Yochai, B., Adam J. B., Kelly M. Greenhill, F. M., Miriam J. Metzger, B., N., Gordon P., & Jonathan L., Z. (2018). The science of fake news. Science, 359(6380). https://doi.org/10.1126/science.aao2998

Ruchansky, N., Seo, S., & Liu, Y. (2017). CSI: A hybrid deep model for fake news detection. In J. Doe, & A. Smith (Eds.). Proceedings of the 2017 ACM Conference on Information and Knowledge Management (pp. 797– 806). Association for Computing Machinery. https://doi.org/10.1145/3132847.3132877

Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H. (2019). Fake news detection on social media: A data mining perspective. SIGKDD Explorations, 19(1), 22–36. https://doi.org/10.1145/3137597.3137600

Starbird, K., Arif, A., Wilson, T. (2019). Disinformation as collaborative work: Surfacing the participatory nature of strategic information operations. Proceedings of the ACM on Human-Computer Interaction, 3(CSCW). https://doi.org/10.1145/3359229

Published

2025-08-29

Issue

Section

Cybersecurity and information protection

How to Cite

A method for modeling hybrid influence on government services using an agent-Based Approach. (2025). Information Systems and Technologies Security, 1(9), 47-53. https://doi.org/10.17721/ISTS.2025.9.47-53