Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities
This paper solves the problem of modeling the scheme for developing software systems, which can be used in building solutions for secure energy networks. A development scheme is proposed in a set of representations through which each program of the software complex passes, namely the following repre...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-07-01
|
Series: | Energies |
Subjects: | |
Online Access: | https://www.mdpi.com/1996-1073/16/13/5111 |
_version_ | 1797591768325160960 |
---|---|
author | Igor Kotenko Konstantin Izrailov Mikhail Buinevich Igor Saenko Rajeev Shorey |
author_facet | Igor Kotenko Konstantin Izrailov Mikhail Buinevich Igor Saenko Rajeev Shorey |
author_sort | Igor Kotenko |
collection | DOAJ |
description | This paper solves the problem of modeling the scheme for developing software systems, which can be used in building solutions for secure energy networks. A development scheme is proposed in a set of representations through which each program of the software complex passes, namely the following representations: idea, conceptual model, architecture, algorithm, source code, graphic code, abstract syntax tree, assembler code, machine code, byte code, executed code. The main properties of each representation are indicated, such as the form (text, graphic, programming language, binary, and decoded), development (transformation) methods, as well as vulnerabilities that are detected in it. An example of each representation is given, particularly as applied to the energy networks. The scheme elements (representations, vulnerabilities, forms, etc.) and the main operations for working with their elements (representation transformation, vulnerability injection, and detection) are presented in an analytical form. An example of a development scheme for a simple software complex of energy networks is given. The classification of vulnerabilities is introduced; it divides the vulnerabilities according to the structural level, functioning disruption, and information impact. The vulnerabilities in each of the views are substantiated using the common vulnerabilities and exposures (CVE) database. An experiment was conducted to demonstrate the vulnerability spread across representations during the development of a software complex example for the energy network. The features of the applications of the obtained results for energy networks are taken into account. The advantages, disadvantages, and limitations of the study, as well as ways to eliminate them, are discussed. |
first_indexed | 2024-03-11T01:42:03Z |
format | Article |
id | doaj.art-72568eb607a9467cb97f8d0edc1c5567 |
institution | Directory Open Access Journal |
issn | 1996-1073 |
language | English |
last_indexed | 2024-03-11T01:42:03Z |
publishDate | 2023-07-01 |
publisher | MDPI AG |
record_format | Article |
series | Energies |
spelling | doaj.art-72568eb607a9467cb97f8d0edc1c55672023-11-18T16:30:34ZengMDPI AGEnergies1996-10732023-07-011613511110.3390/en16135111Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of VulnerabilitiesIgor Kotenko0Konstantin Izrailov1Mikhail Buinevich2Igor Saenko3Rajeev Shorey4Computer Security Problems Laboratory, St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 Saint-Petersburg, RussiaComputer Security Problems Laboratory, St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 Saint-Petersburg, RussiaDepartment of Applied Mathematics and Information Technologies, Saint-Petersburg University of State Fire Service of EMERCOM of Russia, 196105 Saint-Petersburg, RussiaComputer Security Problems Laboratory, St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 Saint-Petersburg, RussiaUniversity of Queensland-IIT Delhi Academy of Research (UQIDAR), New Delhi 110016, IndiaThis paper solves the problem of modeling the scheme for developing software systems, which can be used in building solutions for secure energy networks. A development scheme is proposed in a set of representations through which each program of the software complex passes, namely the following representations: idea, conceptual model, architecture, algorithm, source code, graphic code, abstract syntax tree, assembler code, machine code, byte code, executed code. The main properties of each representation are indicated, such as the form (text, graphic, programming language, binary, and decoded), development (transformation) methods, as well as vulnerabilities that are detected in it. An example of each representation is given, particularly as applied to the energy networks. The scheme elements (representations, vulnerabilities, forms, etc.) and the main operations for working with their elements (representation transformation, vulnerability injection, and detection) are presented in an analytical form. An example of a development scheme for a simple software complex of energy networks is given. The classification of vulnerabilities is introduced; it divides the vulnerabilities according to the structural level, functioning disruption, and information impact. The vulnerabilities in each of the views are substantiated using the common vulnerabilities and exposures (CVE) database. An experiment was conducted to demonstrate the vulnerability spread across representations during the development of a software complex example for the energy network. The features of the applications of the obtained results for energy networks are taken into account. The advantages, disadvantages, and limitations of the study, as well as ways to eliminate them, are discussed.https://www.mdpi.com/1996-1073/16/13/5111information securityenergeticssoftware engineeringsoftware representationanalytical modelingcyber resilience |
spellingShingle | Igor Kotenko Konstantin Izrailov Mikhail Buinevich Igor Saenko Rajeev Shorey Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities Energies information security energetics software engineering software representation analytical modeling cyber resilience |
title | Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities |
title_full | Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities |
title_fullStr | Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities |
title_full_unstemmed | Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities |
title_short | Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities |
title_sort | modeling the development of energy network software taking into account the detection and elimination of vulnerabilities |
topic | information security energetics software engineering software representation analytical modeling cyber resilience |
url | https://www.mdpi.com/1996-1073/16/13/5111 |
work_keys_str_mv | AT igorkotenko modelingthedevelopmentofenergynetworksoftwaretakingintoaccountthedetectionandeliminationofvulnerabilities AT konstantinizrailov modelingthedevelopmentofenergynetworksoftwaretakingintoaccountthedetectionandeliminationofvulnerabilities AT mikhailbuinevich modelingthedevelopmentofenergynetworksoftwaretakingintoaccountthedetectionandeliminationofvulnerabilities AT igorsaenko modelingthedevelopmentofenergynetworksoftwaretakingintoaccountthedetectionandeliminationofvulnerabilities AT rajeevshorey modelingthedevelopmentofenergynetworksoftwaretakingintoaccountthedetectionandeliminationofvulnerabilities |