Preview

Russian Technological Journal

Advanced search

Probabilistic characteristics analysis of virus attack effect on digital substations

https://doi.org/10.32362/2500316X-2025-13-1-28-37

EDN: BUGTUV

Abstract

Objectives. This study aims to create analytical methods for evaluating the probabilistic safety characteristics of information and software elements in digital substations in order to ensure security in different virus scenarios.

Methods. The methods of reliability theory, random process theory, and recovery theory were used.

Results. The derived integral ratios were further used to estimate the probability characteristics of information processing security when performing functional tasks in various scenarios of attacks on digital substations, as well as multiple technologies used for protection against such threats. Numerical studies of safe information processing probability of different intensities of attacks and times of their activation were conducted, in order to consider the frequency of diagnostics of the system by the service personnel and customer requirements for the safe operation of the system in a certain period. We performed calculations for various protection technologies against similar attacks on digital substations. A protection technology with system diagnostic deterministic frequency can support customer requirements in the event of accidental and relatively rare virus attacks. Security technologies consider different maintenance personnel operation modes to ensure customer fulfillment requirements for safe information processing probability and the case of deliberate attacks on digital substations in each period.

Conclusions. The technologies considered herein for information protection from attacks on digital substations can provide the necessary level of information security system operation for all types of threats. These technologies can be applied when the system diagnostics frequency increases from twice an hour to at least once every 25 minutes. Our findings underline the importance of timely monitoring of ever-changing attack environments for digital substations.

About the Authors

Alexander S. Leontyev
MIREA – Russian Technological University
Russian Federation

Alexander S. Leontyev, Cand. Sci. (Eng.), Senior Researcher, Associate Professor, Department of Mathematical Support and Standardization, Institute of Information Technologies, 

78, Vernadskogo pr., Moscow, 119454.


Competing Interests:

The authors declare no conflicts of interest.



Dmitry V. Zhmatov
MIREA – Russian Technological University
Russian Federation

Dmitry V. Zhmatov, Cand. Sci. (Eng.), Associate Professor, Department of Mathematical Support and Standardization, Institute of Information Technologies, 

78, Vernadskogo pr., Moscow, 119454.

Scopus AuthorID: 56825948100.


Competing Interests:

The authors declare no conflicts of interest.



References

1. Starovoitov A.V., Starikov P.P., Dubitsky K.A., Lukyanov S.E., Pavlov L.P., Simonov V.M., Syedin D.Yu. Computerized complex of federal information systems for supporting decision-making in the field of science and technology. Informatizatsiya i svyaz’ = Informatization and Communication. 2021;6:7–19 (in Russ.). https://doi.org/10.34219/20788320-2021-12-6-7-19

2. Leontyev A.S. Multilevel Analytical and Analytical-Simulation Models for Evaluating the Probabilistic and Temporal Characteristics of Multimachine Computing Complexes with Regard to Reliability. Mezhdunarodnyi nauchno-issledovatel’skii zhurnal = International Research Journal. 2023;5(131) (in Russ.). https://doi.org/10.23670/IRJ.2023.131.8

3. Kostogryzov A.I., Reznikov G.Y. Modeling of Hazardous Impact Processes on Protected Information System. Informatsionnye tekhnologii v proektirovanii i proizvodstve = Information Technologies in Design and Production. 2004;2:17–27 (in Russ.).

4. Gusev K.V., Leontiev A.S. Theoretical Development of Models for the Assessment of Security against Unauthorized Access and Preservation of the Confidentiality of the Information Used. IT Standard. 2021;4(29):38–44 (in Russ.).

5. Akimova G.P., Solovyev A.V., Tarkhanov I.A. Modeling the reliability of distributed information systems. Informatsionnye tekhnologii i vychislitel’nye sistemy = Journal of Information Technologies and Computing Systems. 2019;3:70–86 (in Russ.). https://doi.org/10.14357/20718632190307

6. Pavsky V.A., Pavsky K.V. Mathematical Model for Calculating Reliability Indicators of Scalable Computer Systems Considering Switching Time. Izvestiya YuFU. Tekhnicheskie nauki = Izvestiya SFedU. Engineering Sciences. 2020;2(212): 134–145 (in Russ.). https://doi.org/10.18522/2311-3103-2020-2-134-145

7. Minitaeva A.M., Sokolov A.V. Main Ways of Penetration and Impact of File Viruses on the System. Mezhdunarodnyi zhurnal gumanitarnykh i estestvennykh nauk = International Journal of Humanities and Natural Sciences. 2023;4–3(79):56–60 (in Russ.). https://doi.org/10.24412/2500-1000-2023-4-3-56-60

8. Litvinov P.V. Simulation modeling of information security issues as a tool for assessing security and cost optimization. Mir komp’yuternoi avtomatizatsii = Computer Automation World. 2016;1:43–53 (in Russ.).

9. Blazutskaya E.Y., Sharafutdinov A.G. Next Generation Viruses and Antiviruses. NovaInfo.ru. 2015;1(35):92–94 (in Russ.).

10. Popov I.O., Marunko A.S., Petrov O.I., Oleinik A.A. Viruses and Antivirus Programs in Information Security. Nauchnye zapiski molodykh issledovatelei = Scientific Notes of Young Scientists. 2020;8(4):74–80 (in Russ.).

11. Sidenko G.A., Redko G.V., Beznos O.S. Comparative Analysis of Antivirus Programs. StudNet. 2020;9:676–680 (in Russ.).

12. Zavodtsev I.A., Borisov M.A., Bondarenko M.M., Meleshko V.A. Refined Method of Analytical Modeling of Viral Software Propagation Processes for Assessing Security of Informatization Objects. Computational Nanotechnology. 2022;9(1):11–20 (in Russ.).

13. Boyko A.A. Method of Analytical Modeling of Viruses Propagation Process in Computer Networks with Different Topology. Trudy SPIIRAN = SPIIRAS Proceedings. 2015;5(42):196–211 (in Russ.). https://doi.org/10.15622/sp.42.4

14. Magazev A.A., Tsyrulnik V.F. Investigation of a Markov Model for Computer System Security Threats. Aut. Control Comp. Sci. 2018;52(7):615–624. https://doi.org/10.3103/S0146411618070180 [Original Russian Text: Magazev A.A., Tsyrulnik V.F. Investigation of a Markov Model for Computer System Security Threats. Modelirovanie i analiz informatsionnykh sistem. 2017;24(4):445–458 (in Russ.). https://doi.org/10.18255/18181015-2017-4-445-458 ]

15. Kotenko I.V., Vorontsov V.V. Analytical Models of Network Worms Propagation. Trudy SPIIRAN = SPIIRAS Proceedings. 2007;4:208–224 (in Russ.). https://doi.org/10.15622/sp.4.15


Supplementary files

1. Probability of safe operation of the information system in different threat scenarios
Subject
Type Исследовательские инструменты
View (19KB)    
Indexing metadata ▾
  • The derived integral ratios were further used to estimate the probability characteristics of information processing security when performing functional tasks in various scenarios of attacks on digital substations, as well as multiple technologies used for protection against such threats.
  • A protection technology with system diagnostic deterministic frequency can support customer requirements in the event of accidental and relatively rare virus attacks.
  • Security technologies consider different maintenance personnel operation modes to ensure customer fulfillment requirements for safe information processing probability and the case of deliberate attacks on digital substations in each period.

Review

For citations:


Leontyev A.S., Zhmatov D.V. Probabilistic characteristics analysis of virus attack effect on digital substations. Russian Technological Journal. 2025;13(1):28-37. https://doi.org/10.32362/2500316X-2025-13-1-28-37. EDN: BUGTUV

Views: 191


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2782-3210 (Print)
ISSN 2500-316X (Online)