Causes, classification, and criticality of information system software vulnerabilities

Objective . The purpose of this paper is to describe the causes of software vulnerabilities, as well as their classification. Eliminating the ambiguity of the concept of software vulnerability criticality. Method . Analysis of existing approaches to the assessment, classification, and identification...

Full description

Saved in:
Bibliographic Details
Published inVestnik Dagestanskogo gosudarstvennogo tehničeskogo universiteta. Tehničeskie nauki (Online) Vol. 52; no. 2; pp. 98 - 106
Main Author Efimov, A. O.
Format Journal Article
LanguageEnglish
Published 10.08.2025
Online AccessGet full text
ISSN2073-6185
2542-095X
2542-095X
DOI10.21822/2073-6185-2025-52-2-98-106

Cover

Abstract Objective . The purpose of this paper is to describe the causes of software vulnerabilities, as well as their classification. Eliminating the ambiguity of the concept of software vulnerability criticality. Method . Analysis of existing approaches to the assessment, classification, and identification of software vulnerabilities. Modeling, building a UML model, and describing an algorithm. Result. A definition of the criticality of a software vulnerability is proposed. The causes of the software are partially described, and the existing classification of software vulnerabilities is expanded. An example of assessing the criticality of software vulnerabilities based on calculated metrics is given. An example of vulnerability metrics evaluation and prioritization is given. The UML model and vulnerability assessment algorithm are presented. Conclusion . The results of the conducted research expand the list of indicators and the subject area of the description of software vulnerabilities.
AbstractList Objective . The purpose of this paper is to describe the causes of software vulnerabilities, as well as their classification. Eliminating the ambiguity of the concept of software vulnerability criticality. Method . Analysis of existing approaches to the assessment, classification, and identification of software vulnerabilities. Modeling, building a UML model, and describing an algorithm. Result. A definition of the criticality of a software vulnerability is proposed. The causes of the software are partially described, and the existing classification of software vulnerabilities is expanded. An example of assessing the criticality of software vulnerabilities based on calculated metrics is given. An example of vulnerability metrics evaluation and prioritization is given. The UML model and vulnerability assessment algorithm are presented. Conclusion . The results of the conducted research expand the list of indicators and the subject area of the description of software vulnerabilities.
Author Efimov, A. O.
Author_xml – sequence: 1
  givenname: A. O.
  surname: Efimov
  fullname: Efimov, A. O.
  organization: Voronezh Institute of the Ministry of Internal Affairs of Russia
BookMark eNqVkF9LwzAUxYNMcM59h4Cviya3SZuiL1L8BwNfVHwLaZpAoEtH0jn67c02_QA-3cs953fhnEs0C0OwCF0zegNMAtwCrQpSMikIUBBEAAFSS8JoeYbmIDgQWouvWd7_jBdomZJvacYrWlZ0jj4bvUs2rbDpdZacN3r0Q1hhHTpsoh_zoffjhAeHfXBD3Bx1nKY02g1Ogxv3Olr8veuDjbr12extukLnTvfJLn_nAn08Pb43L2T99vzaPKyJYVSURNe8lQXU2jhKi1YDh1JyBkZ0XPBKGtsZzuuqcLYQ2dIKxjlnQnfSMO6KYoHuT393Yaunve57tY1-o-OkGFXHmtQhvTqkV4ealMgXVcuslxm_O-EmDilF6_5F_wD8FHAz
Cites_doi 10.1109/JPROC.2020.2993293
10.1109/ICMLA.2018.00120
10.15622/sp.2019.18.6.1301-1332
10.15217/issn1684-8853.2017.6.76
10.26583/bit.2023.2.04
10.15622/sp.2020.19.2.6
10.1109/SP.2010.37
ContentType Journal Article
DBID AAYXX
CITATION
ADTOC
UNPAY
DOI 10.21822/2073-6185-2025-52-2-98-106
DatabaseName CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2542-095X
EndPage 106
ExternalDocumentID 10.21822/2073-6185-2025-52-2-98-106
10_21822_2073_6185_2025_52_2_98_106
GroupedDBID AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
GROUPED_DOAJ
ADTOC
IPNFZ
RIG
UNPAY
ID FETCH-LOGICAL-c1056-a94b8329acf003ba24268412c5d45478cedc44973fe35f00b5144415ad8c14f33
IEDL.DBID UNPAY
ISSN 2073-6185
2542-095X
IngestDate Mon Sep 15 08:16:56 EDT 2025
Wed Oct 01 05:40:29 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License https://vestnik.dgtu.ru/jour/about/editorialPolicies#openAccessPolicy
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1056-a94b8329acf003ba24268412c5d45478cedc44973fe35f00b5144415ad8c14f33
OpenAccessLink https://proxy.k.utb.cz/login?url=https://doi.org/10.21822/2073-6185-2025-52-2-98-106
PageCount 9
ParticipantIDs unpaywall_primary_10_21822_2073_6185_2025_52_2_98_106
crossref_primary_10_21822_2073_6185_2025_52_2_98_106
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2025-08-10
PublicationDateYYYYMMDD 2025-08-10
PublicationDate_xml – month: 08
  year: 2025
  text: 2025-08-10
  day: 10
PublicationDecade 2020
PublicationTitle Vestnik Dagestanskogo gosudarstvennogo tehničeskogo universiteta. Tehničeskie nauki (Online)
PublicationYear 2025
References ref13
ref12
ref15
ref14
ref20
ref11
ref10
ref2
ref1
ref17
ref16
ref19
ref18
ref8
ref7
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref15
  doi: 10.1109/JPROC.2020.2993293
– ident: ref1
– ident: ref4
– ident: ref3
– ident: ref13
  doi: 10.1109/ICMLA.2018.00120
– ident: ref20
  doi: 10.15622/sp.2019.18.6.1301-1332
– ident: ref5
– ident: ref6
– ident: ref7
– ident: ref2
  doi: 10.15217/issn1684-8853.2017.6.76
– ident: ref11
  doi: 10.26583/bit.2023.2.04
– ident: ref18
  doi: 10.15622/sp.2020.19.2.6
– ident: ref9
– ident: ref8
– ident: ref19
– ident: ref16
– ident: ref10
– ident: ref17
– ident: ref12
– ident: ref14
  doi: 10.1109/SP.2010.37
SSID ssib018270670
ssib044764369
ssj0002774599
Score 2.3023617
Snippet Objective . The purpose of this paper is to describe the causes of software vulnerabilities, as well as their classification. Eliminating the ambiguity of the...
SourceID unpaywall
crossref
SourceType Open Access Repository
Index Database
StartPage 98
Title Causes, classification, and criticality of information system software vulnerabilities
URI https://doi.org/10.21822/2073-6185-2025-52-2-98-106
UnpaywallVersion publishedVersion
Volume 52
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ : Directory of Open Access Journals [open access]
  customDbUrl:
  eissn: 2542-095X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002774599
  issn: 2542-095X
  databaseCode: DOA
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2542-095X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssib044764369
  issn: 2073-6185
  databaseCode: M~E
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB60BcWDb7GiZUGPbrGb3TQ5FqmI0OKhlXoK-8rFEkvbWPTgb3cmTaV6sl5CyO6GZPYx35fsfANwZUVLeE_BMcgdOBEIHqVOcC8oUtM4ZyQFOHd74f1APgzVsIzjpliYlf_3pC0u6AtIgPwmUtifQiFv4oLHpEgabkI1VAjAK1Ad9B7bz5RGblmZzpUUHAHEcAsu_3C3H35pO8_G-n2uR6MVZ3O3B_3lYy72mLw08plp2I9fCo5rvsc-7Jbgk7UXo-UANnx2CDsrkoRH8HSr86mfXjNLsJr2ERVdd8105pgt8yIgcmevKStFV6mcLRSh2RRX9bmeePaWj0jPuth6i2T8GAZ3nf7tPS9zL3CLiCvkOpYGJ3usbYrz3mjy5JFsCqtcIQFmvbNSxq0g9YHCKgaBF1Ez7SLblGkQnEAle838KTAfOKOdDGk5kVZGRiMhd63AuGbq5U1UA7m0fDJeSGwkSE0KsyVktoTMlpDZEoVXkjjC8rAG6ruX1ml39s9251CZTXJ_gRhkZuoFd8dj97NTL8ffF3j5zek
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8JAEJ4oJBoPvo0YNZvokSWy3S3tkRCJMZF4AIOnZl-9SAoBKtFf7wwtBj2Jt6a727Szj_m-7c43ALdWtIT3FByD3IETgeBR6gT3giI1jXNGUoDzUy98GMjHoRqWcdwUC7P2_560xQXtgATIbyKF_SkU8iYueEyKpOE2VEOFALwC1UHvuf1KaeRWlelaScERQAx34OYPT_vhl3bzbKI_Fno0WnM23QPor16zOGPy1sjnpmE_fyk4bvgdh7Bfgk_WLkbLEWz57Bj21iQJT-Clo_OZn9WZJVhN54iWXVdnOnPMlnkRELmzccpK0VUqZ4UiNJvhqr7QU8_e8xHpWS-P3iIZP4VB977feeBl7gVuEXGFXMfS4GSPtU1x3htNnjySTWGVW0qAWe-slHErSH2gsIpB4EXUTLvINmUaBGdQycaZPwfmA2e0kyEtJ9LKyGgk5K4VGNdMvbyLaiBXlk8mhcRGgtRkabaEzJaQ2RIyW6LwThJHWB7WQH330ibtLv7Z7hIq82nurxCDzM11Oea-AOM-y8M
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Causes%2C+classification%2C+and+criticality+of+information+system+software+vulnerabilities&rft.jtitle=Vestnik+Dagestanskogo+gosudarstvennogo+tehni%C4%8Deskogo+universiteta.+Tehni%C4%8Deskie+nauki+%28Online%29&rft.au=Efimov%2C+A.+O.&rft.date=2025-08-10&rft.issn=2073-6185&rft.eissn=2542-095X&rft.volume=52&rft.issue=2&rft.spage=98&rft.epage=106&rft_id=info:doi/10.21822%2F2073-6185-2025-52-2-98-106&rft.externalDBID=n%2Fa&rft.externalDocID=10_21822_2073_6185_2025_52_2_98_106
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2073-6185&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2073-6185&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2073-6185&client=summon