RUS  ENG
Full version
JOURNALS // Taurida Journal of Computer Science Theory and Mathematics // Archive

Taurida Journal of Computer Science Theory and Mathematics, 2022 Issue 1, Pages 30–39 (Mi tvim136)

Development of a mathematical model and algorithm for the implementation of cybersecurity of control systems of electric power facilities

F. R. Ametov, E. A. Bekirov

V. I. Vernadsky Crimean Federal University, Simferopol

Abstract: The modern automated control system at electric power enterprises is a combination of many systems, modules and interfaces. One of the most important and, at the same time, vulnerable is the switching module, which is a set of devices and interfaces for data transmission, processing and analysis. One of the most popular solutions for organizing communication between control system components is the Modbus protocol, based on certain algorithms and data transfer protocols. Forecasting and analyzing information attacks in order to detect and prevent them prematurely becomes an important task. Analysis and structuring of components and their vulnerabilities will allow you to simulate potentially unprotected places and determine further actions to protect them. The signature-based threat detection method used in data processing includes a feature of packet data transmission in Modbus to detect unwanted or third-party network traffic. This method is based on certain set rules, which also use the principle of threshold values to detect unwanted signatures or anomalies. The principles of communication of devices within production networks, as well as the specifics of transmitting information on them, are defined in standardized specifications. Specifications are a set of protocols that implement system components. A number of the specifications used have limitations related to multiplatform, security and modernization, as a result of which there are problems with network configuration, its support, modernization and security. In this regard, an urgent task is the implementation and support of modern specifications that allow configuring the system with additional security add-ons. An important indicator of any algorithm and any data transmission model is their cryptographic strength, or in other words, the level of protection from potential cyber attacks. Based on the analysis of the collected information, the calculation of the optimal mathematical model of the algorithm for the implementation of cybersecurity on the example of Modbus communication was carried out.

Keywords: Modbus, cybersecurity, slave, master, mathematical model.

UDC: 004.312.466

MSC: 00A71



© Steklov Math. Inst. of RAS, 2024