DEPENDABILITY ASSURANCE METHODOLOGY OF INFORMATION AND CONTROL SYSTEMS USING MULTIPURPOSE SERVICE STRATEGIES

Юрій Леонідович Поночовний, Вячеслав Сергійович Харченко

Abstract


The article considers the methodology of ensuring the dependability of information and control systems using multi-purpose maintenance strategies. The relevance of research is due to the need to ensure the functioning of dependable information and control systems in the face of changes in requirements, environmental parameters, and the manifestation of unspecified failures of their components. The methodology is presented at the system level as a combination of the concept of multi-purpose maintenance, as well as the principles of taking into account changes in the information and control system and environment during the life cycle; comprehensive consideration of different types of failures, and the effects of change; multi-purpose maintenance and combines a set of new models and methods for determining the parameters of dependability information and control systems and the choice of parameters for their maintenance procedures. The proposed concept of multi-purpose maintenance is obtained by developing the Fon-Neumann paradigm and is formulated as a concept of building reliable and secure systems from insufficiently dependable components and multi-purpose maintenance on combined strategies in changing conditions and environment. The scope of the proposed concept is applicable in cases where the principles of von-Neumann do not allow building a viable system due to economic, temporal, or other reasons. In this case, the use of principles, methods, and models that are conceptual, extends to information and control systems built using maintained components and system multi-purpose service strategies. The proposed principle of taking into account changes involves the expansion of the classical control circuit of the fault-tolerant system, which response to the fault occurrence as errors and failures. The principle of comprehensive consideration of different types of failures and the effects of change is a continuation of the principles of unity and connection during the procedures of system analysis. It is also a logical continuation of the facet arrangement of fault types and chains of causal relationships from faults and defects to faults, failures, and errors. Within the framework of the proposed methodology, multi-purpose maintenance strategies, a set of options for goals, types, processes, properties, and parameters of information and control systems have been developed, which reduces model uncertainty and justifies practical measures to ensure dependability at different stages of the life cycle.

Keywords


dependability assurance methodology; multi-purpose maintenance; information and control systems

References


Ross, R., Pillitteri, V., Graubart, R., Bodeau, D. and McQuaid, R. Developing Cyber Resilient Systems: A Systems Security Engineering Approach. NIST Special Publication 800-160, vol. 2, 2019. 229 p. doi: 10.6028/NIST.SP.800-160v2.

Assante, M., Lee, R. and Conway, T. TLP: White - ICS Defense Use Case. Modular ICS Malware. Electricity Information Sharing and Analysis Center (E-ISAC), 2017. 27 p.

Yarovaya, М. Softserve Has Been Attacked by Hackers. Available at: https://ain.ua/2020/09/01/softserve-haknuli/ (accessed 21.08. 2020).

IEC 60050-192:2015: International Electrotechnical Vocabulary (IEV) - Part 192: Dependability. European Committee for Electrotechnical Standardization Publ., 2015. 239 p.

ISO/IEC 60300-1:2014: Dependability Management – Part 1: Guidance For Management And Application. European Committee for Electrotechnical Standardization Publ., 2014. 98 p.

DSTU 2861-94. Nadiynistʹ tekhniky. Analiz nadiynosti. Osnovni polozhennya [Reliability of equipment. Reliability analysis. Substantive provisions]. Derzhstandart Ukrayiny Publ., 1995. 35 p.

Avizienis, A., Laprie, J., Randell, B. and Landwehr, C. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, vol. 1(1), pp. 11-33. doi: 10.1109/TDSC.2004.2.

Gorbenko, A., Kharchenko, V. and Romanovsky, A. On composing Dependable Web Services using undependable web components. International Journal of Simulation and Process Modelling, 2007, vol. 3(1/2), pp. 45-54. doi: 10.1504/IJSPM.2007.014714

Kharchenko, V., Sklyar, V. and Siora, A. Dependability of Safety-Critical Computer Systems through Component-Based Evolution. 2009 Fourth International Conference on Dependability of Computer Systems, 2009, pp. 42-49. doi: 10.1109/DepCoS-RELCOMEX.2009.22.

Brezhnev, E., Kharchenko, V., Manulik, V. and Leontiev, K. Critical Energy Infrastructure Safety Assurance Strategies Considering Emergent Interaction Risk. Advances in Dependability Engineering of Complex Systems, 2017, pp. 67-78. doi: 10.1007/978-3-319-59415-6_7.

Von Neumann, J. Probabilistic logics and the synthesis of reliable organisms from unreliable components. Avtomaty, 1956, pp. 68-139.

Kharchenko, V. S. Harantozdatni systemy ta bahatoversiyni obchyslennya: aspekty evolyutsiyi [Dependable systems and multiversion computing: aspects of evolution]. Radioelectronic and computer systems. 2009, vol. 7, pp. 46-59.

Gorbenko, A., Kharchenko, V., Popov, P., Romanovsky, A. Dependable Composite Web Services with Components Upgraded Online. In: de Lemos, R., Gacek, C., Romanovsky, A. (eds). Architecting Dependable Systems III. Lecture Notes in Computer Science, 2005, vol. 3549, pp. 92–121. doi: 10.1007/11556169_5.

Illiashenko, O., Kharchenko, V., Kor, A., Panarin, A. and Sklyar, V. Hardware diversity and modified NUREG/CR-7007 based assessment of NPP I&C safety. 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017, pp. 907-911. doi: 10.1109/IDAACS.2017.8095218.

Brezhniev, Ye. Multilevel Fuzzy Logic-Based Approach for Critical Energy Infrastructure’s Cyber Resilience Assessment. 10th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2019, pp. 213-217, doi: 10.1109/DESSERT.2019.8770034.

Bulygina, O., Emel'yanov, A., Emel'yanova, N. and Kukushkin, A. Sistemnyi analiz v upravlenii [System analysis in management]. Moscow, FORUM:

INFRA-M Publ., 2017. 450 p. doi: 10.12737/textbook_5923d5ac7ec116.40684446.

Prokopenko, T. O. Teoriya system i systemnyy analiz [Systems theory and systems analysis]. Ministry of Education and Science of Ukraine, Cherkas. derzh. tekhnol. un-t Publ., 2019. 139 p.

Geida, A. and Lysenko, I. Operational Properties Of Agile Systems And Their Functioning Investigation Problems: Conceptual Aspects. Applied Informatics, vol. 5 (71), 2017, pp. 93-106.

Kharchenko, V., Dotsenko, S., Ponochovnyi, Yu., and Illiashenko, O. Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application. Information & Security: An International Journal 2020, vol. 47, no. 1, pp. 77-90.

Menasche, D., Trivedi, K., and Altman, E. Rejuvenation and the Age of Information. 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, pp. 225-231. doi: 10.1109/ISSREW.2019.00076.

Bai, J., Chang, X., Machida, F., Trivedi, K. and Han, Z. Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views. IEEE Access, vol. 8, 2020, pp. 6448-6459. doi: 10.1109/ACCESS.2019.2963397.

Grottke, M., Nikora, A. and Trivedi, K. An empirical investigation of fault types in space mission system software. 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), 2010, pp. 447-456, doi: 10.1109/DSN.2010.5544284.

Randell, B. Occurrence Nets Then and Now: The Path to Structured Occurrence Nets. Applications and Theory of Petri Nets, 2011, pp. 1-16. doi: 10.1007/978-3-642-21834-7_1.

Abdulmunem, A. and Kharchenko, V. Availability and Security Assessment of Smart Building Automation Systems: Combining of Attack Tree Analysis and Markov Models. 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), 2016, pp. 302-307, doi: 10.1109/MCSI.2016.062.




DOI: https://doi.org/10.32620/reks.2020.3.05

Refbacks

  • There are currently no refbacks.