IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v16y2023i13p5111-d1185250.html
   My bibliography  Save this article

Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities

Author

Listed:
  • Igor Kotenko

    (Computer Security Problems Laboratory, St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 Saint-Petersburg, Russia)

  • Konstantin Izrailov

    (Computer Security Problems Laboratory, St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 Saint-Petersburg, Russia)

  • Mikhail Buinevich

    (Department of Applied Mathematics and Information Technologies, Saint-Petersburg University of State Fire Service of EMERCOM of Russia, 196105 Saint-Petersburg, Russia)

  • Igor Saenko

    (Computer Security Problems Laboratory, St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 Saint-Petersburg, Russia)

  • Rajeev Shorey

    (University of Queensland-IIT Delhi Academy of Research (UQIDAR), New Delhi 110016, India)

Abstract

This paper solves the problem of modeling the scheme for developing software systems, which can be used in building solutions for secure energy networks. A development scheme is proposed in a set of representations through which each program of the software complex passes, namely the following representations: idea, conceptual model, architecture, algorithm, source code, graphic code, abstract syntax tree, assembler code, machine code, byte code, executed code. The main properties of each representation are indicated, such as the form (text, graphic, programming language, binary, and decoded), development (transformation) methods, as well as vulnerabilities that are detected in it. An example of each representation is given, particularly as applied to the energy networks. The scheme elements (representations, vulnerabilities, forms, etc.) and the main operations for working with their elements (representation transformation, vulnerability injection, and detection) are presented in an analytical form. An example of a development scheme for a simple software complex of energy networks is given. The classification of vulnerabilities is introduced; it divides the vulnerabilities according to the structural level, functioning disruption, and information impact. The vulnerabilities in each of the views are substantiated using the common vulnerabilities and exposures (CVE) database. An experiment was conducted to demonstrate the vulnerability spread across representations during the development of a software complex example for the energy network. The features of the applications of the obtained results for energy networks are taken into account. The advantages, disadvantages, and limitations of the study, as well as ways to eliminate them, are discussed.

Suggested Citation

  • Igor Kotenko & Konstantin Izrailov & Mikhail Buinevich & Igor Saenko & Rajeev Shorey, 2023. "Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities," Energies, MDPI, vol. 16(13), pages 1-40, July.
  • Handle: RePEc:gam:jeners:v:16:y:2023:i:13:p:5111-:d:1185250
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/16/13/5111/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/16/13/5111/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Jakub Swacha, 2022. "Models of Sustainable Software: A Scoping Review," Sustainability, MDPI, vol. 14(1), pages 1-12, January.
    2. Lee, Sang Hun & Kang, Hyun Gook, 2016. "Integrated framework for the external cost assessment of nuclear power plant accident considering risk aversion: The Korean case," Energy Policy, Elsevier, vol. 92(C), pages 111-123.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Muhammad Fakhrul Safitra & Muharman Lubis & Hanif Fakhrurroja, 2023. "Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity," Sustainability, MDPI, vol. 15(18), pages 1-32, September.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Chen, Hao & Tang, Bao-Jun & Liao, Hua & Wei, Yi-Ming, 2016. "A multi-period power generation planning model incorporating the non-carbon external costs: A case study of China," Applied Energy, Elsevier, vol. 183(C), pages 1333-1345.
    2. Geng, Liuna & Liu, Ting & Zhou, Kexin & Yang, Genmao, 2018. "Can power affect environmental risk attitude toward nuclear energy?," Energy Policy, Elsevier, vol. 113(C), pages 87-93.
    3. Samar Hussni Anbarkhan, 2023. "A Fuzzy-TOPSIS-Based Approach to Assessing Sustainability in Software Engineering: An Industry 5.0 Perspective," Sustainability, MDPI, vol. 15(18), pages 1-18, September.
    4. Thomas Meissner & Xavier Gassmann & Corinne Faure & Joachim Schleich, 2023. "Individual characteristics associated with risk and time preferences: A multi country representative survey," Journal of Risk and Uncertainty, Springer, vol. 66(1), pages 77-107, February.
    5. Gopalakrishnan Sriraman & Shriram Raghunathan, 2023. "A Systems Thinking Approach to Improve Sustainability in Software Engineering—A Grounded Capability Maturity Framework," Sustainability, MDPI, vol. 15(11), pages 1-16, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:16:y:2023:i:13:p:5111-:d:1185250. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.