Classification and coding of software defects resulting from cyberattacks
Abstract
Based on the analysis of the impact of cyberattacks on the state of operability of automated systems and complexes, the article proposes a methodology for classifying and coding defects of damaged software. The methodology for classifying and coding software defects was developed based on certain characteristics and classification features of the most common cyberattacks and software defects resulting from their effects. The classification is based on existing relationships between damaged software and possible defects resulting from cyberattacks, as well as between software defects and methods for their detection and recovery. Based on the analysis of classification features, the structure of the technological code of a damaged software defect was developed, the elements of which are certain classification features. Using the example of one of the types of cyberattacks, SQL-injection, a practical example of classification and assignment of codes for defects of damaged software is given, as well as options for possible combinations of defect codes that may arise during the action of a cyberattack of the type SQL-injection. In order to further formalize the repair of damaged software defects, a hierarchical relationship equal to the theoretical state tree of the SQL injection attack type is given, which corresponds to the order of classification and coding. The studies that have been conducted allow applying the methodology for classifying and coding damaged software defects due to cyberattacks for automated design of technological processes for diagnosing damaged software defects, as well as determining the feasibility of restoring software modules and solving other technological issues related to information protection.
References
2. Junting Gao., Liping Zhang., Fengrong Zhao., Ye Zhai. (2019). Research on Software Defect Classification, IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). Chengdu, China.
3. Felix, E. A., & Lee, S. P. (2020). Predicting the number of defects in a new software version. PLoS ONE, 15(3). Retrieved from https://doi.org/10.1371/journal.pone.0229131.
4. Hovorushchenkoa T. (2021). Criteria and Rules for Classification of Software Failures and Vulnerabilities, The 1st International Workshop on Information Technologies: Theoretical and Applied Problems. Ternopil, Ukraine
5. Akif, H. M., Reddy, R. V., Nagella, K., & Vidya, S. (2021). Software Defect Estimation Using Machine Learning Algorithms. International Journal of Recent Technology and Engineering, 10(1), 204.
Abstract views: 5 PDF Downloads: 2