Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities

This paper solves the problem of modeling the scheme for developing software systems, which can be used in building solutions for secure energy networks. A development scheme is proposed in a set of representations through which each program of the software complex passes, namely the following repre...

Full description

Bibliographic Details
Main Authors: Igor Kotenko, Konstantin Izrailov, Mikhail Buinevich, Igor Saenko, Rajeev Shorey
Format: Article
Language:English
Published: MDPI AG 2023-07-01
Series:Energies
Subjects:
Online Access:https://www.mdpi.com/1996-1073/16/13/5111
_version_ 1797591768325160960
author Igor Kotenko
Konstantin Izrailov
Mikhail Buinevich
Igor Saenko
Rajeev Shorey
author_facet Igor Kotenko
Konstantin Izrailov
Mikhail Buinevich
Igor Saenko
Rajeev Shorey
author_sort Igor Kotenko
collection DOAJ
description This paper solves the problem of modeling the scheme for developing software systems, which can be used in building solutions for secure energy networks. A development scheme is proposed in a set of representations through which each program of the software complex passes, namely the following representations: idea, conceptual model, architecture, algorithm, source code, graphic code, abstract syntax tree, assembler code, machine code, byte code, executed code. The main properties of each representation are indicated, such as the form (text, graphic, programming language, binary, and decoded), development (transformation) methods, as well as vulnerabilities that are detected in it. An example of each representation is given, particularly as applied to the energy networks. The scheme elements (representations, vulnerabilities, forms, etc.) and the main operations for working with their elements (representation transformation, vulnerability injection, and detection) are presented in an analytical form. An example of a development scheme for a simple software complex of energy networks is given. The classification of vulnerabilities is introduced; it divides the vulnerabilities according to the structural level, functioning disruption, and information impact. The vulnerabilities in each of the views are substantiated using the common vulnerabilities and exposures (CVE) database. An experiment was conducted to demonstrate the vulnerability spread across representations during the development of a software complex example for the energy network. The features of the applications of the obtained results for energy networks are taken into account. The advantages, disadvantages, and limitations of the study, as well as ways to eliminate them, are discussed.
first_indexed 2024-03-11T01:42:03Z
format Article
id doaj.art-72568eb607a9467cb97f8d0edc1c5567
institution Directory Open Access Journal
issn 1996-1073
language English
last_indexed 2024-03-11T01:42:03Z
publishDate 2023-07-01
publisher MDPI AG
record_format Article
series Energies
spelling doaj.art-72568eb607a9467cb97f8d0edc1c55672023-11-18T16:30:34ZengMDPI AGEnergies1996-10732023-07-011613511110.3390/en16135111Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of VulnerabilitiesIgor Kotenko0Konstantin Izrailov1Mikhail Buinevich2Igor Saenko3Rajeev Shorey4Computer Security Problems Laboratory, St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 Saint-Petersburg, RussiaComputer Security Problems Laboratory, St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 Saint-Petersburg, RussiaDepartment of Applied Mathematics and Information Technologies, Saint-Petersburg University of State Fire Service of EMERCOM of Russia, 196105 Saint-Petersburg, RussiaComputer Security Problems Laboratory, St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 Saint-Petersburg, RussiaUniversity of Queensland-IIT Delhi Academy of Research (UQIDAR), New Delhi 110016, IndiaThis paper solves the problem of modeling the scheme for developing software systems, which can be used in building solutions for secure energy networks. A development scheme is proposed in a set of representations through which each program of the software complex passes, namely the following representations: idea, conceptual model, architecture, algorithm, source code, graphic code, abstract syntax tree, assembler code, machine code, byte code, executed code. The main properties of each representation are indicated, such as the form (text, graphic, programming language, binary, and decoded), development (transformation) methods, as well as vulnerabilities that are detected in it. An example of each representation is given, particularly as applied to the energy networks. The scheme elements (representations, vulnerabilities, forms, etc.) and the main operations for working with their elements (representation transformation, vulnerability injection, and detection) are presented in an analytical form. An example of a development scheme for a simple software complex of energy networks is given. The classification of vulnerabilities is introduced; it divides the vulnerabilities according to the structural level, functioning disruption, and information impact. The vulnerabilities in each of the views are substantiated using the common vulnerabilities and exposures (CVE) database. An experiment was conducted to demonstrate the vulnerability spread across representations during the development of a software complex example for the energy network. The features of the applications of the obtained results for energy networks are taken into account. The advantages, disadvantages, and limitations of the study, as well as ways to eliminate them, are discussed.https://www.mdpi.com/1996-1073/16/13/5111information securityenergeticssoftware engineeringsoftware representationanalytical modelingcyber resilience
spellingShingle Igor Kotenko
Konstantin Izrailov
Mikhail Buinevich
Igor Saenko
Rajeev Shorey
Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities
Energies
information security
energetics
software engineering
software representation
analytical modeling
cyber resilience
title Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities
title_full Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities
title_fullStr Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities
title_full_unstemmed Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities
title_short Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities
title_sort modeling the development of energy network software taking into account the detection and elimination of vulnerabilities
topic information security
energetics
software engineering
software representation
analytical modeling
cyber resilience
url https://www.mdpi.com/1996-1073/16/13/5111
work_keys_str_mv AT igorkotenko modelingthedevelopmentofenergynetworksoftwaretakingintoaccountthedetectionandeliminationofvulnerabilities
AT konstantinizrailov modelingthedevelopmentofenergynetworksoftwaretakingintoaccountthedetectionandeliminationofvulnerabilities
AT mikhailbuinevich modelingthedevelopmentofenergynetworksoftwaretakingintoaccountthedetectionandeliminationofvulnerabilities
AT igorsaenko modelingthedevelopmentofenergynetworksoftwaretakingintoaccountthedetectionandeliminationofvulnerabilities
AT rajeevshorey modelingthedevelopmentofenergynetworksoftwaretakingintoaccountthedetectionandeliminationofvulnerabilities