Multidimensional Model of Information Struggle with Impulse Perturbation in Terms of Levy Approximation

: The focus of this research was on building a decision support system for a model that characterizes the conflict interaction of n-dimensional complex systems with non-trivial internal structures. The interpretation of the new model was focused on information warfare as the impact of rare events that quickly change certain perceptions of a large number of people. Consequently, the support for various ideas experiences stochastic jumps, a phenomenon observable through a non-classical Levy approximation scheme. The essence of our decision support system lies in its ability to navigate the complex dynamics of conflict interaction among multifaceted systems. Through the utilization of advanced modeling techniques, our aim is to illuminate the complicated interplay of factors influencing information warfare and its cascading effects on societal perceptions and behaviors. Key components of our decision support system encompass model development, simulation capabilities, data integration, and visualization tools. The significance of our work lies in its potential to inform policy formulation, conflict resolution strategies, and societal resilience in the face of information warfare. By providing decision-makers with actionable intelligence and foresight into emerging threats and opportunities, our decision support system serves as a valuable tool for navigating the complexities of modern conflict dynamics. In conclusion, developing a decision support system for modeling conflict interaction in complex systems represents an essential step toward enhancing our understanding of information warfare and its consequences. Through interdisciplinary collaboration and innovative modeling techniques, we aim to provide stakeholders with the insights and capabilities needed to navigate the developing landscape of conflict and ensure the stability and resilience of society.


Introduction
The objective of an information threat is to compromise the integrity, confidentiality, or availability of information, thereby causing harm to individuals, organizations, or states [1].It is evident that these threats require effective mitigation strategies.In the context of information warfare, adversaries may exploit information threats to discredit opponents, undermine public trust in specific entities, or even manipulate election processes.Information threats manifest in various forms within the realm of information warfare.In order to counter information threats effectively, it is imperative to develop robust security measures [2].Primarily, this involves the construction of mathematical models that consider a multitude of factors capable of influencing the evolving situation.
The Lotka-Volterra model, which describes predator-prey interactions, is one of the main types of models of many processes in applied mathematics, social sciences, and economics [1,[3][4][5][6].The classical Lotka-Volterra model, well-known for its applications in predator-prey interactions, encounters significant limitations when applied to the dynamics of information dissemination.One of the primary drawbacks of this model lies in its inability to accommodate the dynamic nature of information influence.Specifically, the model assumes constancy in the characteristics (intensities) of information impact, failing to account for sudden and unpredictable events that profoundly affect the perceptions of information consumers Other approaches to modeling the spread of information are models of population dynamics, in particular, Gompertz dynamics, which are exponential at small moments of time and pass to some asymptotic level at large moments of time [7][8][9], game models [10] or models described by linear partial equations derivatives [11].However, in real-world scenarios, the dissemination of information is characterized by volatility and unpredictability, influenced by a myriad of factors such as breaking news, viral content, and social media trends.The model's static nature precludes it from capturing the nuanced dynamics of information dissemination in contemporary society [12][13][14].
Considering this gap, the construction and analysis of a new model of information warfare take into account both frequent events that occur with high probabilities and rare ones that quickly change some beliefs of a large number of people.As a result, the quantities of adherents of different ideas make stochastic jumps that we may see applying the Levy approximation scheme.We suppose that such a model could be essential as soon as now breaking news produces quick and astonishing influence on the audience through social media and the Internet or TV channels.The behavior of the model could not be analyzed obviously for any fixed moment of time as it was done in a classical case.But, as it is usual for stochastic models, we may obtain functional limit theorems that present the behavior at large time intervals [14][15][16][17][18][19].In order to streamline the decision-making process and facilitate result visualization, a software implementation was developed for the described process.JetBrains PyCharm Community Edition 2023.3 software, along with the Matplotlib 3.6.2library calculation visualization package, was selected as the programming language for this purpose.Additionally, it was decided not to utilize off-the-shelf solutions for the primary calculations, thus ensuring complete control over the construction of the numerical solution.
Hence, this study introduces several innovative contributions.Primarily, it presents a multi-dimensional model of information warfare that incorporates the influence of random factors, offering a more comprehensive understanding of the dynamics of information conflicts.Secondly, a software decision support system was developed based on the analyzed stochastic system.This system enables real-time construction, analysis, and management of various information scenarios, providing decision-makers with valuable insights for effective response strategies.

Model of Information Warfare
The application of this approach to the model of information warfare was initially proposed in [1].The authors conceptualize a specific social community characterized by a constant population size denoted as N 0 , which faces potential exposure to various types of information threats.The values N 1 (t), N 2 (t), . . . ,N n (t) are the number of "supporters" depending on time t who have perceived new information, ideas, norms, etc. of type 1, 2, . . ., n respectively.
In the "classical" version, the model is described by the Lotka-Volterra equations: Key assumptions about the model (1): 1.
There are multiple concepts and n ideas that are disseminated among the community through 2 information channels: • the first is "external" to the community, for example, an advertising media campaign.Its intensity is characterized by the parameters α 1 > 0, . . .α n > 0, respectively, and the parameters α i , i = 1, . . ., n are considered independent of time and environment; • the second "internal" channel is the interpersonal communication between members of the social community (its intensity, i.e., the number of equivalent information contacts characterized by the parameters β 1 > 0, . . ., β n > 0, respectively, which also do not depend on time and environment).As a result, supporters of the first idea who have already been "recruited" (their number is equal to N 1 (t)) make their contribution to the process of spreading the idea among the community by influencing its "unrecruited" members (their number is equal to ).The same applies to supporters of other ideas.

2.
The rate of change of the number of supporters N 1 (t), . . .N n (t) (i.e., the number of supporters of the respective idea "recruited" per unit of time) consists of: • the external recruitment rate (proportional to the product of intensities α 1 , . . ., α n by the number of individuals not yet recruited accordingly; internal rate of recruitment (it is proportional to the product of intensities β 1 , β 2 , . . ., β n by the corresponding number of active supporters N 1 (t), N 2 (t), . . . ,N n (t) and the number of unrecruited accordingly; thus, the model can be described by equations (1) of the Lotka-Volterra type (for more details on possible solutions and characteristics of the dynamic system, see [5]).

Model of Information Warfare with Impulse Influence and Markov Switches
We extend the approach to building an information warfare model proposed in [1] to the multidimensional case: where, where (A) N ε (t) is an n-dimensional vector of solutions, the components of which are the num- bers of supporters of different ideas; (B) x t/ε 2 is a uniformly ergodic Markov process that models the influence of the environment on the intensity of information dissemination.This means that in the period between the moments of resumption of such a Markov process, the values of α 1 (x), α 2 (x), . . . ,α n (x), β 1 (x), β 2 (x), . . . ,β n (x) are constant, as in the classical model, while at the moments of resumption the values change instantly.This models random events that occur independently of society and have a significant impact on people's views.
The Markov random process x t/ε 2 is defined in the standard phase space (X, X), which is given by the generator [14][15][16][17].
on the Banach space B(X) of bounded functions with real values and a supremum norm The stochastic kernel P(x, B), x ∈ X, B ∈ X defines a uniformly ergodic nested Markov chain x n = x(τ n ), n ≥ 0, where τ n are the jump moments of the nested chain, which has a stationary distribution ρ(B), x ∈ X, B ∈ X.The stationary distribution Π(B), B ∈ X, of the Markov process x(t), t ≥ 0 can be determined from the relation [18] Π(dx)q(x) = qρ(dx) Let us define the potential operator R 0 for the generator Q using the relation The impulsive perturbation process (IPP) [14,16,18,20,21] η ε (t), t ≥ 0, which components under the Levy approximation scheme is given by where the set of processes with independent increments η ε i (t, x), t ≥ 0, x ∈ X, is determined by the generators and satisfy the conditions of the Levy approximation.
L1: Approximation of averages: Here, the measure Γ g (x) is bounded for all g(v) ∈ C 3 (R) and is defined by the relation where C 3 (R) is a class of functions that define a measure and contains bounded functions with real values such that g(v)/|v| 2 → 0 when v → 0 .L3: Uniform quadratic integrability:

Asymptotic Model Analysis
Let's assume that the balance condition is met We present the asymptotic properties of the impulsive perturbation process obtained in [18].Theorem 1.If the balance condition (3) and the Levy approximation conditions L1-L3 are satisfied, then there is a weak convergence η ε (t) → η 0 (t), ε → 0 The limit process η 0 (t) is determined by the generator Thus, in the limit, we have obtained a Levy process with three components: a deterministic shift, a diffusion component, and a Poisson jump part.
Proof.Since more general statements were already proved by us earlier [18], for our model (2), we will present the main stages of the proof with more detailed explanations in the proof of Theorem 2 for the entire dynamic system.
As we know [14], generators of processes with independent increments η ε (t, x), t ≥ 0, x ∈ X, on test functions φ(ω) ∈ C 3 (R) under conditions L1-L3 admit the asymptotic representation where It is also a well-known fact [14] that the generator of the two-component Markov process η ε , x t/ε 2 , t ≥ 0 has the form where the remainder term Let us consider the so-called truncated generator: When the balance condition ( 3) is fulfilled, the solution of the singular perturbation problem for the truncated operator Γ ε 0 (x) on the test functions is realized by the relation [14] where the residual term θ ε η (x)φ(ω) is uniformly bounded at x.The limit operator is determined by the formula and applying Theorem 6.3 from [14], we obtain the necessary convergence of processes, i.e., the statement of the Theorem 1. □ Next, we are ready to study the asymptotic properties of the dynamical system, in particular, using the approaches proposed in [14,18].Theorem 2. When the balance condition (3) and Levy approximation conditions L1-L3 are satisfied, weak convergence in the sense of generator convergence is valid The limit process is determined by the generator The averaged function has the form Proof.As it was established in the monograph [14], the generator of the two-component Markov process u ε (t), x t/ε 2 , t ≥ 0, can be written in the form where The generator L ε (x) in the case of an impulse perturbation process of admits an asymptotic representation [14] Remainder term θε ω (x)φ(ω, x) → 0 at ε → 0 .We apply the truncated operator of the form: Taking into account the fulfillment of the balance condition (3), we will solve the singular perturbation problem for the truncated operator (5) on the test functions where remainder term θ ε ω (x) is uniformly bounded at x.The limit operator L is given by the formula Indeed, in order to fulfill equality (6), it is necessary that the coefficients with the same powers of ε on the left and right sides are equal.For this purpose, we calculate: The balance condition (3) is a condition for the solvability of the equation and The solvability condition of the last equation gives the limit operator L in the form (7). Applying Theorem 6.3 from [14], we finally obtain the statement of the Theorem 2. □

Modeling and Software Implementation
In our formulation, the average marginal model of information warfare is outlined as follows: this model serves as a comprehensive framework for analyzing various facets of information warfare, encompassing a wide array of factors and dynamics.By examining the average marginal effects across different dimensions, we gain insights into the nuanced interplay between variables and their impact on the broader landscape of information threats.This model offers a structured approach to dissecting the complexities inherent in information warfare scenarios, enabling a deeper understanding of its underlying mechanisms and potential mitigation strategies.The proposed model formulation can be presented by Equation ( 4) with the matrix in the form (2) appearing and the assumptions described during the construction of the model, in particular (A) and (B), are fulfilled.
For the software implementation, the decision was made to utilize the Python language due to its versatility and extensive libraries.The visualization aspect was executed using the Matplotlib 3.6.2library package, known for its effectiveness in creating clear and insightful graphical representations.Opting against pre-existing solutions for calculations provided us with greater flexibility in obtaining precise numerical solutions tailored to our specific requirements.Despite eschewing off-the-shelf solutions for fundamental calculations, Python (JetBrains PyCharm Community Edition 2023.3)offers a wealth of libraries that expedite the coding process for tasks such as generating numerical series according to the normal distribution law or handling operations with arrays and tabular data.Leveraging these libraries not only streamlines development but also ensures reliability and efficiency in our implementation.
The characteristics of the jumps process are following λ = 5, σ = 5.Here, we are using a discrete jumps process, so λ is intensity of jumps and σ used to describe variability.
In this case, input parameters for the outer channel rely on TV channel ratings or the amount of auditory.
As depicted in Figure 1, the fourth type of information threat emerges as the predominant leader, attributed to its notably higher initial coefficients.However, it is noteworthy that during the initial stages, the leadership position was transiently held by other types of information threats, primarily due to the influence of random shifts.In real-world scenarios, such shifts may manifest as unexpected downtime or the dissemination of compromising information by certain TV channels.
It is pertinent to highlight that the magnitude of random disturbances, often referred to as "strength," can be manipulated for experimental purposes.For instance, by augmenting parameters such as θ and σ to values of 4 and 8 respectively, the ensuing results are markedly affected.Notably (Figure 2), deviations exhibit a substantial increase under these augmented conditions. of information threats, primarily due to the influence of random shifts.In real-world scenarios, such shifts may manifest as unexpected downtime or the dissemination of compromising information by certain TV channels.It is pertinent to highlight that the magnitude of random disturbances, often referred to as "strength," can be manipulated for experimental purposes.For instance, by augmenting parameters such as θ and σ to values of 4 and 8 respectively, the ensuing results are markedly affected.Notably (Figure 2), deviations exhibit a substantial increase under these augmented conditions.As depicted in the graph (Figure 1), it is evident that the fourth type of information threat no longer maintains its status as the predominant contender.This observation underscores a critical insight: even when the combined significance of the   and   coefficients appears substantial, it may not guarantee decisive influence under certain conditions.The emergence of this outcome highlights the potential impact of robust random processes.These processes, characterized by their unpredictability and strength, possess the capacity to exert substantial influence on the dynamics of information dissemination.Consequently, even factors traditionally perceived as influential may be overshadowed or mitigated by the effects of these potent random processes.This realization underscores the importance of accounting for stochastic elements in modeling and analyzing information dissemination dynamics, as they can significantly alter expected outcomes and challenge conventional interpretations of influence and dominance.promising information by certain TV channels.It is pertinent to highlight that the magnitude of random disturbances, often referred to as "strength," can be manipulated for experimental purposes.For instance, by augmenting parameters such as θ and σ to values of 4 and 8 respectively, the ensuing results are markedly affected.Notably (Figure 2), deviations exhibit a substantial increase under these augmented conditions.As depicted in the graph (Figure 1), it is evident that the fourth type of information threat no longer maintains its status as the predominant contender.This observation underscores a critical insight: even when the combined significance of the   and   coefficients appears substantial, it may not guarantee decisive influence under certain conditions.The emergence of this outcome highlights the potential impact of robust random processes.These processes, characterized by their unpredictability and strength, possess the capacity to exert substantial influence on the dynamics of information dissemination.Consequently, even factors traditionally perceived as influential may be overshadowed or mitigated by the effects of these potent random processes.This realization underscores the importance of accounting for stochastic elements in modeling and analyzing information dissemination dynamics, as they can significantly alter expected outcomes and challenge conventional interpretations of influence and dominance.As depicted in the graph (Figure 1), it is evident that the fourth type of information threat no longer maintains its status as the predominant contender.This observation underscores a critical insight: even when the combined significance of the α n and β n coefficients appears substantial, it may not guarantee decisive influence under certain conditions.The emergence of this outcome highlights the potential impact of robust random processes.These processes, characterized by their unpredictability and strength, possess the capacity to exert substantial influence on the dynamics of information dissemination.Consequently, even factors traditionally perceived as influential may be overshadowed or mitigated by the effects of these potent random processes.This realization underscores the importance of accounting for stochastic elements in modeling and analyzing information dissemination dynamics, as they can significantly alter expected outcomes and challenge conventional interpretations of influence and dominance.
In addition, we also consider the case where the same input parameters apply to all types of information threats.
Upon reflection of the scenario outlined above, it becomes evident that one might anticipate an equal distribution of adherents across each type of information threat.However, due to the interplay of diffusion processes and sudden jumps, the resulting output becomes inherently unpredictable.The diffusion process, characterized by the gradual spread of information over time, interacts with stochastic jumps, which represent sudden, significant shifts in the number of adherents for specific ideas.As a result of these dynamic forces, the distribution of adherents among different types of information threats deviates from a uniform pattern, leading to unpredictable outcomes.This unpredictability is illustrated in Figure 3, where the fluctuating nature of the distribution highlights the complex dynamics at play in information dissemination.Given the stochastic nature of the process, it is anticipated that subsequent simulations will yield varying results, even in the absence of alterations to the input parameters.This randomness stems from the inherent unpredictability of certain factors influencing the simulation, such as initial conditions or external variables.As a consequence, each simulation run may produce distinct outcomes, reflecting the inherent variability of the system being modeled.Therefore, the expectation of observing different results in successive simulations, even when input parameters remain unchanged, is a natural consequence of the inherent randomness inherent in the simulation process (Figure 4).Given the stochastic nature of the it is anticipated that subsequent simulations will yield varying results, even in the absence of alterations to the input parameters.This randomness stems from the inherent unpredictability of certain factors influencing the simulation, such as initial conditions or external variables.As a consequence, each simulation run may produce distinct outcomes, reflecting the inherent variability of the system being modeled.Therefore, the expectation of observing different results in successive simulations, even when input parameters remain unchanged, is a natural consequence of the inherent randomness inherent in the simulation process (Figure 4).

Conclusions
This article presents a comprehensive examination of the complexities involved in developing a model to address n-types of information threats while considering environmental variability.The primary aim is to assess the velocity of information threat dissemination and integrate it into the development of countermeasure strategies.By employing the Poisson approximation scheme, the model can differentiate between deterministic shifts and jumps in the limit process, thereby accommodating real-world nuances in information propagation.
Key findings from this study include the proposal of a multidimensional model that surpasses the classical approach in terms of generality and accuracy [22][23][24].Moreover, explicit constructions of the limit generators of the impulse process and the dynamical system were achieved, facilitating a deeper understanding of the model's behavior.Fur-

Conclusions
This article presents a comprehensive examination of the complexities involved in developing a model to address n-types of information threats while considering environmental variability.The primary aim is to assess the velocity of information threat dissemination and integrate it into the development of countermeasure strategies.By employing the Poisson approximation scheme, the model can differentiate between deterministic shifts and jumps in the limit process, thereby accommodating real-world nuances in information propagation.
Key findings from this study include the proposal of a multidimensional model that surpasses the classical approach in terms of generality and accuracy [22][23][24].Moreover, explicit constructions of the limit generators of the impulse process and the dynamical system were achieved, facilitating a deeper understanding of the model's behavior.Furthermore, the developed software solution streamlines calculations, enhancing the model's practical applicability.
The proposed model offers significant advantages, notably in conducting precise and comprehensive analyses of information threat spread.Enabling accurate measurement of spread rates it empowers decision-makers to formulate more effective response strategies.Additionally, the model's ability to analyze temporal changes in information threat spread facilitates trend identification and prediction of future threats.
In conclusion, the developed model represents a significant advancement in understanding and mitigating information threats.Its ability to account for environmental variability and accurately analyze information spread dynamics makes it a valuable tool for policymakers and security practitioners in devising proactive and effective response strategies.Further research and experimentation will continue to refine and validate the model's performance in diverse contexts and scenarios.

Figure 2 .
Figure 2. Visualization of information warfare at higher random deviations.

Figure 2 .
Figure 2. Visualization of information warfare at higher random deviations.

Figure 2 .
Figure 2. Visualization of information warfare at higher random deviations.

Figure 3 .
Figure 3. Displaying a case with the same input parameters for each information threat.

Figure 3 .
Figure 3. Displaying a case with the same input parameters for each information threat.

Figure 4 .
Figure 4. Displaying a case with the same input parameters for each information threat, second simulation.

Figure 4 .
Figure 4. Displaying a case with the same input parameters for each information threat, second simulation.