The problems of network security in information processing in the telecommunication devices, the software code which may have vulnerability are investigated. The classification of vulnerabilities by structural level is shown. We consider the following existing methods of neutralization: cryptographic protection, the development of a safe source code, construction of the safe executable code, search for vulnerabilities in the source and executable code, the creation of safe execution frameworks. The author's way to neutralize the vulnerability by algorithmization of the machine code is described.
information security, telecommunication devices, software code, neutralization of vulnerabilities, algorithmization method
1. Buynevich M.V., Vladyko A.G., Docenko S.M., Simonina O.A. Organizacionno-tehnicheskoe obespechenie ustoychivosti funkcionirovaniya i bezopasnosti seti svyazi obschego pol'zovaniya. SPb.: SPbGUT, 2013. 144 s.
2. Buynevich M.V., Scherbakov O.V., Vladyko A.G., Izrailov K.E. Arhitekturnye uyazvimosti modeley telekommunikacionnyh setey // Nauchno-analiticheskiy zhurnal «Vestnik Sankt-Peterburgskogo universiteta Gosudarstvennoy protivopozharnoy sluzhby MChS Rossii». 2015. № 4. S. 86-93.
3. Izrailov K.E. Analiz sostoyaniya v oblasti bezopasnosti programmnogo obespecheniya // V sbornike: Aktual'nye problemy infotelekommunikaciy v nauke i obrazovanii. II Mezhdunarodnaya nauchno-tehnicheskaya i nauchno-metodicheskaya konferenciya. 2013. S. 874-877.
4. Izrailov K.E. Model' prognozirovaniya ugroz telekommunikacionnoy sistemy na baze iskusstvennoy neyronnoy seti // Vestnik INZhEKONa. Seriya: Tehnicheskie nauki. 2012. № 8(59). S. 150-153.
5. Buynevich M.V. Sistematizaciya komp'yuternyh atak na telekommunikacionnye seti v kontekste modeli narushitelya // Vestnik Sankt-Peterburgskogo universiteta MVD Rossii. 2005. № 3. S. 306-315.
6. Buynevich M.V., Tiamiyu O.A. Programmnaya arhitektura sistemy upravleniya doverennoy marshrutizaciey v global'nyh telekommunikacionnyh setyah // Informatizaciya i svyaz'. 2014. № 3. S. 35-38.
7. Buynevich M.V., Magon A.E., Shiryaev D.M. Analiz vozmozhnosti bezopasnogo masshtabirovaniya telekommunikacionnoy struktury ASU putem prinuditel'noy marshrutizacii trafika standartnymi sredstvami // Voprosy sovremennoy nauki i praktiki. Universitet im. V.I. Vernadskogo. 2008. № 3(13). T. 2. S. 161-164.
8. Izrailov K.E. Algoritmizaciya mashinnogo koda telekommunikacionnyh ustroystv kak strategicheskoe sredstvo obespecheniya informacionnoy bezopasnosti // Nacional'naya bezopasnost' i strategicheskoe planirovanie. 2013. № 2(2). S. 28-36.
9. Buynevich M.V., Izrailov K.E. Metod algoritmizacii mashinnogo koda telekommunikacionnyh ustroystv // Telekommunikacii. 2012. № 12. C. 2-6.
10. Buynevich M.V., Scherbakov O.V., Izrailov K.E. Model' mashinnogo koda, specializirovannaya dlya poiska uyazvimostey // Vestnik Voronezhskogo instituta GPS MChS Rossii. 2014. № 2(11). S. 46-51.
11. Buynevich M.V., Scherbakov O.V., Izrailov K.E. Strukturnaya model' mashinnogo koda, specializirovannaya dlya poiska uyazvimostey v programmnom obespechenii avtomatizirovannyh sistem upravleniya // Problemy upravleniya riskami v tehnosfere. 2014. № 3(31). S. 68-74.
12. Izrailov K.E. Rasshirenie yazyka «C» dlya opisaniya algoritmov koda telekommunikacionnyh ustroystv // Informacionnye tehnologii i telekommunikacii. 2013. № 2(2). S. 21-31.
13. Buynevich M.V., Izrailov K.E. Avtomatizirovannoe sredstvo algoritmizacii mashinnogo koda telekommunikacionnyh ustroystv // Telekommunikacii. 2013. № 6. S. 2-9.
14. Buinevich M., Izrailov K. Method and utility for recovering code algorithms of telecommunication devices for vulnerability search // 16th International Conference on Advanced Communication Technology (ICACT). 2014. pp. 172-176.
15. Buinevich M., Izrailov K., Vladyko A. Method for partial recovering source code of telecommunication devices for vulnerability search // 17th International Conference On Advanced Communications Technology (ICACT). 2015. pp. 76-80.
16. Buinevich M., Izrailov K., Vladyko A. Method and prototype of utility for partial recovering source code for low-level and medium-level vulnerability search // 18th International Conference on Advanced Communication Technology (ICACT). 2016. pp. 700-707.
17. Izrailov K.E. Metodika ocenki effektivnosti sredstv algoritmizacii, ispol'zuemyh dlya poiska uyazvimostey // Informatizaciya i svyaz'. 2014. № 3. S. 44-47.
18. Izrailov K.E., Vasil'eva A.Yu., Ramazanov A.I. Ukrupnennaya metodika ocenki effektivnosti avtomatizirovannyh sredstv, vosstanavlivayuschih ishodnyy kod v celyah poiska uyazvimostey // Vestnik INZhEKONa. Seriya: Tehnicheskie nauki. 2013. № 8(67). S. 107-109.
19. Buinevich M., Izrailov K., Vladyko A. The life cycle of vulnerabilities in the representations of software for telecommunication devices // 18th International Conference on Advanced Communication Technology (ICACT). 2016. pp. 430-435.