<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>November</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Analysis  and  assessment  of  functional  stability  of  information  systems supporting management processes  </article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Dodonov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olena Gorbachyk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maryna Kuznietsova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Information Recording of the National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>2, Mykoly Shpaka Street, Kyiv, 03113</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <volume>16</volume>
      <issue>2022</issue>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>   The concept of functional stability of information systems and its characteristics are defined. We propose to build functionally stable information systems (IS) using the principles of multi-version diversity, multi-parameter adaptation, and multi-level management of system degradation. Features of specific implementation of multi-version of processes and products are described. A model of a multi-version system is presented. Indicators of functional stability are proposed, considering the functional capabilities of the system and its structural features. The problem of assessing functional stability taking into account the structure of IS is described. It is shown that the evaluation of the functional stability of the IS based on the parameters of the graph describing its structure is reduced to the clarification of the question of the viability of the graph or the structural viability of the IS. The methods and means of increasing the structural survivability of IS are outlined. Operational cycles at different levels of the IS hierarchy have been analyzed in order to ensure its functional stability. Ways of increasing the functional stability of information systems are considered, in particular, the technology of dynamic reconfiguration. The implementation of the dynamic IS reconfiguration management subsystem is proposed and the main functions of its components (monitoring, analysis, localization, selection and decision-making, implementation, database and knowledge modules) are analyzed. Measures to ensure the reliability of software and increase the functional stability of information systems are described</p>
      </abstract>
      <kwd-group>
        <kwd>1  Information system</kwd>
        <kwd>functional stability</kwd>
        <kwd>indicator of functional stability</kwd>
        <kwd>dynamic reconfiguration</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction </title>
      <p>The functioning of most information systems (IS) involved in management processes takes place
under the conditions of constant interaction with a permanently changing external environment. A
significant part of such interactions are various informational conflicts that significantly affect the
achievement of the system-wide goal. Information conflicts can lead to the destruction of information
resources, violations of interaction regulations and regular information processes, as a result of which
the performance of system and application functions is violated, and accordingly, management
violations occur, which can represent a potential threat to human life and the environment in case of
object criticality management.</p>
      <p>To prevent emergency situations, it is important to assess the risks and develop means of
forecasting, early detection, prevention, and countermeasures against destructive informational
influences from the external environment. Otherwise, elimination of their consequences will require
significant material and human resources.</p>
      <p>The development of functionally stable information systems involves several urgent tasks,
including:
• the early detection and countermeasures against harmful informational influences of the external
environment;
• practical assessment of the reliability of IS software;
• development and implementation of mechanisms for increasing the survivability of IS.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Basic provisions </title>
      <p>
        Nowadays IS is the most important tool for supporting management processes and ensuring the
safety of the operation of various management objects, in particular, critical infrastructures. In order
to avoid violations in management processes, it is necessary to ensure that IS, which are components
of automated organizational management systems, have such a property as functional stability, which
allows IS to maintain and/or restore the performance of functions in conditions of various types of
disturbing influences, minimizing the risks of transition to an emergency (dangerous) state of the
control object [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Functional stability is a property that indicates the level of reliability, fault tolerance, survivability,
and security in IS. Functional stability of IS is usually ensured by the introduction of a certain
redundancy; implementation of the built-in control system; formation of a contour of protection
against the negative effects of the external environment; using components with an increased level of
security and reliability. However, additional redundancy leads to the deterioration of technical and
economic characteristics of IS. Control systems may not always respond adequately to abnormal
situations, and the probability of such situations is not reduced. The protection circuit minimizes the
influence of external factors, but does not completely eliminate it. The choice of an element base with
a higher level of security and reliability increases the fault tolerance of the IS, but does not ensure
functional stability when the failure has already occurred. The functional security of IS is evaluated
using various procedures and techniques [
        <xref ref-type="bibr" rid="ref2 ref3">2,3</xref>
        ], which are not sufficiently systematized and agreed on
input and output parameters. To minimize the risks of inaccurate assessment, it is necessary to
determine the order of their compatible and parallel application.
      </p>
      <p>If in a time interval t under any set of destructive influences R t there is at least one workable
distribution of IS resources, which will ensure the implementation of a defined set of functions
F  fn  with a quality level not lower than a given one in the presence of the state of
communication in this interval  lim , then the IC is functionally stable in the time interval t .</p>
      <p>The operational failures flow, destructive effects of various origins (of diverse nature), intentional
damage, and unauthorized interference, errors of service personnel can cause IS failures, leading to a
decrease in functional stability or a complete loss of this property. But in the case of activation and
application of mechanisms for ensuring survivability, such as reconfiguration and/or reorganization of
resources, or by introducing additional resources from the outside, the lost property can be restored.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Assessment of functional stability </title>
      <p>To reduce the probability of failures, IS can use methods and structural solutions based on
multiversion diversity (diversity, N-version, multi-versity). This can prevent issues caused by physical
hardware and software design defects, as well as external influences.</p>
      <p>Multi-version systems use process and product diversity to minimize the impact of hardware and
software defects. These systems have several product versions and backup channels created using
different software and hardware versions.</p>
      <p>A single-version system can be described like a four </p>
      <p>S (1)  X ,Y , Z , F ,
  
where X – is the alphabet of input signals, Y – is the alphabet of internal states, Z – is the alphabet of
output signals, F  f1, f2 ,..., fn  – is the set of performed functions. A multi-version system S ( N ) is
described as follows:</p>
      <p>
        
of versions,    1, 2 ,..., K
implementation.
where X – is the alphabet of input signals, Y – is the alphabet of internal states, Z – is the alphabet
 
of output signals, F  f1, f2 ,..., fn  – is the set of executed functions, V  v1, v2 ,..., vN  – is the set
 – is the set of options for processing the results of version
There is a dependency between multi-version and single-version systems [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]:
      </p>
      <p>S( N )  S(1),V , .</p>
      <p>A single-version system can be structurally redundant and have means  , that process results
from identical channels.</p>
      <p>
        In multi-version systems, it is possible to apply several types of version redundancy [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Their set
R  r1, r2 ,..., rr  can be decomposed into subsets by product versions and process versions. Various
types of version redundancy r  R are accumulated, in turn, in the different product versions of the
multi-purpose system. This is described by mapping using a Boolean matrix   rj :
In this case, a multi-version system can be described as:
      </p>
      <p>  
S ( N , r)  X ,Y , Z , F ,V , , R, </p>
      <p>or
S ( N , r)  S( N ), R,  S(1),V , , R, .</p>
      <p>
 : R V .</p>
      <p>
</p>
      <p>Q :V  C
Ф
ф , ф , … , ф
 Fi  f1, f 2 ,..., fn .</p>
      <p>ŝ , ŝ , … , ŝ , ŝ ⊂ Ŝ.</p>
      <p>

channels of the system
using a Boolean matrix Q  wij :</p>
      <p>
        For multi-version systems, the correspondence between multiple versions Vi
of the backup
С  с1,c2 ,...cq  is also important [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], which can be specified by mapping
And accordingly, the model of the multi-version system will look as follows:
      </p>
      <p>  </p>
      <p>S ( N , r, q)  X ,Y , Z , F ,V , , R, ,C,Q S ( N .r),C,Q.</p>
      <p>
        The principle of multi-version can be effectively supplemented in the design of functionally stable
ICs by multi-parameter adaptation and multi-level controllability of degradation [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Multi-parameter
adaptation involves the organization of several software-implemented and hardware-supported control
loops of the reconfiguration procedure, considering the types and number of failed components, and
multi-level control of degradation allows redistribution of excessive and non-excessive, but mobile
resources (and correction, if necessary, goals of functioning) to minimize volumes of degradation.
      </p>
      <p>Let's define the structure of the object Ŝ management system in the form of a triple:
Ŝ</p>
      <p>〈G, R, U〉,
where G is the component set of the system, R is the set of rules by which the system Ŝ should
function, U is the process of functioning, defined on the set G within the rules of R. IS is a part of the
object’s Ŝ management system .
management tasks:</p>
      <p>Let's assume that in the absence of failures, the IS ensures the performance of a complex of object
The complex of tasks Ф is performed with the specified quality and the required efficiency, provided
that the IS has resources to perform the functions of a certain set:</p>
      <p>At the functional level IS, as a component of the object Ŝ management system, can be
characterized as a set of functional modules performing functions from the set F:</p>
      <p>Let us denote a set of critical management tasks, the failure of which will cause undesirable
changes in the state of the management object, due to Ф
ф , ф , … , ф , Ф
⊂ Ф .
management tasks Ф</p>
      <p>⊂ Ф.</p>
      <p>the function f ∊ F∗, then the value
Management tasks from a set of Ф</p>
      <p>provide for the performance of a set of management tasks,
independent or informationally related, in IS, which is possible if there are resources in the system for
performing functions from a set F.</p>
      <p>Suppose that  ∗ ⊆</p>
      <p>– is some subset of the functions performed in IS. Then, if d is such that:
(1) if any d functional components ŝ fail, the IS can perform any function from the set  ∗ and,
accordingly, the object Ŝ management system will ensure the performance of a set of critical
(2) there will be such a set of (d +1) functional components ŝ and such a function f ∊ F∗, that in case
of failure of (d +1) functional components ŝ , the IS will not be able to ensure the performance of
is defined as the coefficient of functional stability of IS and at the same time of functional stability of
the object Ŝ management system.</p>
      <p>It is clear that 0 P
1.</p>
      <p>. If it is impossible to fail any of the functional components ŝ of the
IS without losing the ability to perform management tasks from the set of Ф ,, then P
If IS resources are sufficient to perform all functions and, in addition, there is a sufficiently large
0.
functional redundancy or the possibility of interchangeability of functional components ŝ in the IS,
then P</p>
      <p>1 .</p>
      <p>Different algorithms for calculating the functional stability index are possible for different classes
of systems. And if the coefficient of functional overlap 
is known - a quantitative indicator
(provided by the IS project) that determines the number of functions 
∊  ∗ performed by one
functional component ŝ of the IS, and characterizes the possibilities of functional interchangeability
ŝ ;  – is the number of  , that must be implemented in IS to perform a set of critical management
tasks by the object Ŝ management system, then it is possible to determine the upper estimate of the
functional stability coefficient:</p>
      <p>between the functional components ŝ of the IS.
4. Evaluation  of  the  functional  stability  of  IS  considering  the  properties  of 
the system structure </p>
      <p>IS, involved in management processes, to the class of complex organizational systems and are
created on the basis of corporate computing technology. The main requirement for such systems is the
guaranteed provision of users (managers) with access to distributed information resources, combined
into a single information space, for solving object management tasks.</p>
      <p>Assessing the functional stability of a distributed IS, provided that its main function is determined,
such as data exchange between communication nodes, is usually reduced to solving the problems of
graph connectivity analysis, assessing the probability of the existence of communication structures
that make it possible to reach a specified node, and assessing the probability of the formation of a
workable structure in IS in conditions of accumulation of damage to communication lines, etc.</p>
      <p>An undirected graph</p>
      <p>V, L ; V
v ; L
l ; i, j 1, 
, serves as a model of the IC structure,
where  – is the set of vertices of the graph corresponding to the set of communication nodes;  – a set
of edges, corresponding to a set of communication lines between communication nodes. The graph is
described by the adjacency matrix:</p>
      <p>A  a
ij , , 
1, M , a
ij
 
1, if l ij  L
0, if lij  L
structure is reduced to clarifying the issue of graph survivability or structural survivability of the IS.
The construction of estimates of the structural survivability of IS is connected with the solution of the
following problems:
search for critical components of the network, in particular nodes, the removal of which leads to
the disintegration of the network into unconnected parts;
analysis of stability, elasticity and vulnerability of the network;
estimations of load of arcs and capacity of the network;
network resiliency analysis;
search for options for construction and development of the network with the minimum value of
the average path, the load of arcs and at the same time with the maximum throughput;
construction of network connectivity indicators.</p>
      <p>
        Calculation of connectivity indicators, such as the probability of connectivity under random graph
edges, can be computationally challenging because it requires direct enumeration. At the same time,
using the paths and sections of the graph simulating the communication network, it is possible to
obtain fairly simple (compared to the exact methods of finding the relevant characteristics) marginal
upper and lower - estimates of the required indicator (Cesari-Proshan, Litvak-Ushakov estimates) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>The study of the connectivity of the majority of graphs, that is, the solution of the problem of
whether a certain node - the source - can communicate with another certain node - the drain, in many
cases does not provide an exhaustive criterion for answering the question about the quality of the
functioning of the system with a network structure. Therefore, research has been conducted to find
other relevant indicators of the quality of functioning of communication networks.</p>
      <p>An important group of indicators of structural survivability, and accordingly structural stability,
are the so-called "measures of survivability". When defining them, it was assumed that an intelligent
adversary, knowing the structure of the network, tries to disrupt its functioning.</p>
      <p>The network has a high survivability index, if it is necessary to "destroy" a large number of nodes
and (or) edges in order to significantly impair or completely interrupt its functioning. Such a measure
of survivability is conventionally called a "deterministic measure of reliability" and is used in the
initial planning and development of communication networks, when there is a shortage of statistical
data on the quality of the network's functioning.</p>
      <p>In mathematical graph theory, survivability measures are often interpreted as quantitative measures
of connectivity for the structure of a graph: minimum cut, nodal connectivity, generalized
connectivity, path length, etc.</p>
      <p>Assessing functional stability and analyzing structural survivability are crucial tasks at the initial
stages of creating a distributed IS communication structure. It involves estimating the maximum flow
that can be transmitted in the network when elements fail under permissible quality of functioning.
When evaluating the survivability of communication networks, depending on the transmission
technologies used in them, the presence of various types of traffic (audio and video information, data,
compressed video and audio), various categories of services, the probability of data loss, and
requirements for the quality of processing are considered. Packet data transmission can increase the
structural survivability of systems. Information packages can take different routes between network
nodes, depending on channel performance and load. In the event that part of the communication
channels is inoperable, destroyed, and the network remains survivable, information will still be
delivered to the destination node via other working channels, and functional stability will be ensured.</p>
      <p>The application of ring topology provides the possibility of automatic switching of channels to
backup ones in the event of any emergency situations. For example, the SDH (Synchronous Digital
Hierarchy) equipment provides the redundancy of lines and hardware units according to the 1+1
scheme. This allows for automatic traffic switching to the backup direction and restorative work
without interrupting traffic.</p>
      <p>Reserving frequently used arcs and nodes in the network is a known method of increasing the
structural survivability and functional stability of distributed IS. Redundant networks can be created
using RSTP technology (Real Time Spanning Tree Protocol), connection of network segments in
pairs (Redundant Coupling), dual connection (Dual Homing), "trunk" connection (traunking) and
technology of redundant ring structures (for example Hirschmann HIPER-Ring).
5. Reconfigurations in IS as a means of increasing functional stability </p>
      <p>The functional stability of IS can be characterized through the operational cycle Ω, which includes
limits of operations depend on the specifics of the defects and features of the IS.
such operations as: failures` prediction w , warning w , detection w , localization w , isolation w ,
parrying
w , reconfiguration procedures w</p>
      <p>
        and information recovery w . The sequence and time
It is also possible to define appropriate operating cycles for various defects, for example, for software
component vulnerabilities we have [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]: w
      </p>
      <p>– prediction of possible characteristics of attacks on this
vulnerability (possibility, method, time parameters); w
– intervention warning; w
– attack
detection through input data control; w</p>
      <p>– localization (isolation) of the component on which the
attack was carried out; w
vulnerability attack; w
configuration.</p>
      <p>The operational cycle 
– reconfiguration that will compensate for a possible failure due to a
– continuation of service operations and selection of stationary
- reconfiguration - is extremely important for increasing the functional
and structural stability of the IS. Reconfiguration is, in general, a process of changing the structure,
parameters, and technologies of functioning to restore the performance and efficiency of the system to
the required level or minimize the decrease in these indicators during functional degradation. The
main difficulty lies in the need to determine the moment of application of the reconfiguration
procedure, rules and algorithms for the redistribution of available resources and the formation of new
structural connections, ensuring the continuity and quality of object management.</p>
      <p>IS means support the completion of management tasks by accumulating, processing, storing, and
transmitting information. In the IS, a subsystem of information interaction arises, which is generated by the
organizational structure of solving the management task. This subsystem consists of switching nodes and
communication channels between individual elements. An undirected graph can serve as a mathematical
model of such a support subsystem for the management task:
Ĝ , 
; 
 ; 

; , 
1, M ,
where  – is the set of vertices of the graph corresponding to the set of switching and information
processing nodes;</p>
      <p>– is the set of edges corresponding to the set of connections between nodes.</p>
      <p>Let's assume that the IS will perform the main function - ensuring information interaction, thanks
to the exchange of data between nodes of switching and information processing - if there is at least
one data transmission route. In this case, the requirement of the functional stability of the IS is
transformed into the requirement of the connectivity of the graph Ĝ, which forms the basis for the
quantitative evaluation of the IS's functional stability, based on IS's topology.</p>
      <p>For example, the failure of the switching and information processing node of the information
interaction subsystem or the loss of connections between nodes due to their physical destruction or
violation of data integrity can make it impossible to perform the tasks of providing information
interaction for object management; deterioration in the functioning of IS (reduction in productivity,
capacity of communication lines, etc.); distortions or defects in the functioning algorithms of
communication and information processing nodes; reduction of structural redundancy, stock of
resources; deterioration of the functioning of IS elements or degradation of the entire system; fatal
loss of operational efficiency of the IS, etc.</p>
      <p>Each IS communication and information processing node v is a functional component of the
system, which is characterized by its functional purpose - a set of functions F ⊆ F. Functional
specialization of nodes occurs by installing appropriate software and establishing the necessary
connections for information exchange. The modular principle of software development allows to form
the necessary configuration of the IS subsystem to perform the functions of accumulating, processing,
storing and transmitting information to support the solution of a specific management task. The
functionality of the v node can be expanded, if necessary, by connecting new software modules.</p>
      <p>Dynamic reconfiguration technology is implemented to ensure the continuity of the management
process, the guaranteed performance of management tasks even in the presence of unwanted
influences on the IS, which can lead to the failure of switching and information processing nodes,
disruption of connections between them in the IS.</p>
      <p>
        The implementation of this technology involves setting and solving various classes of problems of
structural dynamics management, in particular, problems of planning and management of processes of
processing and transfer of resources during restructuring of the structure. Therefore [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], dynamic
reconfiguration is not only a technological solution to compensate for failures in the IS, but also an
independent management process to ensure the operational redistribution of functions and resources
between nodes (functional components of the IS) and increase the efficiency of the functioning of the
IS.
      </p>
      <p>Planning procedures for dynamic IS reconfiguration requires solving the following problems:
• construction of IS reconfiguration scenarios under conditions of destructive influences on the
system or control object;
• development, analysis and multi-criteria synthesis of plans for functional and structural
reconfiguration in conditions of permanent change in the operating environment;
• research through analytical and simulation modeling of the conditions for the reconfiguration
procedures implementation.</p>
      <p>
        Dynamic reconfiguration procedures in IS can be implemented by a separate IS subsystem, which
should include a monitoring module, an analysis module, a localization module, a selection and
decision-making module, a decision implementation module, and a database and knowledge base
(DBKB) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>The monitoring module is designed to collect data on the state of the IS and its components. Data
collection takes place in accordance with the defined list of monitoring indicators. The received data
are recorded, indicating the exact time of their receipt, in the appropriate tables of the specialized
DBKB.</p>
      <p>The analysis module is designed to detect deviations in the functioning of the IS and its
components. In the work of the analysis module, the values of the selected indicators (obtained at the
monitoring stage and stored in the specialized DBKB) are used. The detection of critical deviations of
the indicators from the normative or limit values allows to identify the IS components that are
potentially dangerous for its stable functioning, as well as to assess their impact on the functioning of
other components. The indicator values obtained at the monitoring stage are constantly checked for
compliance with the limits set for each indicator. The analysis module forms a list of potentially
dangerous IS components, which is passed on to the localization module for processing.</p>
      <p>Therefore, the analysis module, based on the monitoring data, diagnoses the state of the IS,
determines the criticality of the detected deviations and produces a command for further working out
the situation. The results are recorded in DBKB. IS components identified at the analysis stage, which
are vulnerable to unwanted influence, must be localized.</p>
      <p>The localization module is designed to further work out the existing situation, in case of receiving
a command from the analysis module to localize dangerous IS components that have critical
deviations. Localization means actions directed against the spread and implementation of a threat to
the functioning of the IS, therefore, the main task at the stage of localization is to perform actions that
will exclude dangerous IS components that are under unwanted influence from the working
configuration of the system in the shortest possible time.</p>
      <p>The main functions of the localization module: calculation of the localization area; selection of
localization methods; localization of components that showed critical deviations in functioning;
formation of a list of users who need to be informed about localization results; forming and sending
messages to users about localization results; formation of a list of operational functional components
of the IS.</p>
      <p>After the localization of IS functional components vulnerable to unwanted influence is completed,
a list of functional components that can potentially be used for reconfiguration - redistribution of
functional tasks is formed. The list formed at this stage will be used at the stage of selection and
decision-making regarding the application of the reconfiguration procedure.</p>
      <p>Thanks to the localization of dangerous IS components vulnerable to unwanted influence, the
functioning of the IS is stabilized and the further spread of unwanted influence is stopped. However,
this step does not return the system to normal working condition.</p>
      <p>The selection and decision-making module is designed to form a decision on the selection and
application of the reconfiguration procedure to restore the process of information support for solving
management tasks. The main functions of this module: definition of functional tasks for
redistribution; determination of limitations for each of the functional tasks to be redistributed;
definition of the list of functional components of IS and their properties for redistribution of
functional tasks; solving the problem of redistribution of functional tasks taking into account the
specified restrictions.</p>
      <p>
        First, the selection and decision-making module prepares a list of functional tasks, in the
performance of which functional components vulnerable to unwanted influence were involved at the
time of localization, as well as tasks that must be performed by these functional components of the IS
in the future. As a result of gathering information, two groups of functional tasks are formed: (1) –
tasks, the execution of which was interrupted during the localization process and which were not
completed in the normal mode, (2) – tasks that must be performed after the completion of the
interrupted tasks according to the requirements of the technological process, which is realized. For
each of the tasks from these two lists, you need to construct constraints that formalize the properties
and requirements of the functional tasks. In particular, their priorities are determined; restrictions on
user access rights, etc. are set [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>The second block of input information for solving the problem of redistribution of functional tasks
is a list of IS components that are operational at the moment and on which functional tasks from the
list built earlier can potentially be performed. This list is formed on the basis of the list of components
built in the last step of the localization module. Naturally, the list of components for redistribution
may be smaller than the list of IS components generated by the localization module. The next step is
to form a list of properties for each functional component of the IS from the last list (performance,
current load, scheduled load, etc.). Prepared information about functional tasks, constraints, a list of
functional components and their properties are input information for solving the reconfiguration task
and obtaining a set of solutions that are ranked according to certain criteria, and the one with the
highest rank is chosen. The obtained results are recorded in DBKB.</p>
      <p>
        The implementation module is designed to implement the decision made at the previous stage.
Functions of the solution implementation module: implementation of the selected reconfiguration
procedure; formation of a list of users who need to be notified of the results of reconfiguration [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
The implementation module starts the execution of tasks that were terminated in an emergency as a
result of the localization process, on the specified IS components, makes the necessary changes in the
structure of the sequence of execution of the set of tasks and makes these changes in the task manager,
which monitors the sequence of their execution. Since part of the tasks with a low priority can be
excluded from further execution, this leads to a change in the structure of relationships between tasks.
      </p>
      <p>The data and knowledge base is a specialized database (DBKB) designed to store data and
knowledge necessary for the functioning of the dynamic reconfiguration subsystem: a list of
indicators and their parameters (limit and normative values); time series of indicator values obtained
as a result of monitoring; a list of IS components to be localized; localization methods and
mechanisms. The need to use DBKB is based on the fact that the amount of data received for storage
per unit of time is quite large, it depends on the number of indicators that are monitored, as well as the
frequency of data acquisition. For such purposes, an industrial relational DBMS cannot be used, as it
is not designed to solve problems related to large volumes of data.</p>
      <p>The dynamic reconfiguration subsystem should work in the background, performing a continuous
process of monitoring the state of the IS and its components according to the specified indicators. In
the case of detection of deviations from the set standard mode of operation, which may lead to or have
led to abnormal situations, the dynamic reconfiguration subsystem is activated.</p>
      <p>Practical experience shows that the implementation of the dynamic reconfiguration procedure
allows us to increase the functional stability of IS and, consequently, the quality of information
support for the performance of management tasks, in particular, to ensure the safety of the functioning
of critical infrastructure objects and infrastructure as a whole.</p>
    </sec>
    <sec id="sec-4">
      <title>6. Functional stability and reliability of IS software </title>
      <p>The analysis of the functional stability of IS involved in management processes is, first of all,
based on a complex representation of systems as such, which must ensure the performance of
specified functions (provision of relevant services) under conditions of occurrence or manifestation of
physical, design defects of hardware and software, which lead to errors and failures; the appearance of
failures as a result of violations of interaction with physical and informational environments with
variable parameters of the influence of those interventions; a possible change in the requirements for
IS services and the occurrence of unspecified failures.</p>
      <p>The study of failures and disasters in complex management systems of the banking, administrative
and industrial sectors revealed a variety of situations in which errors and failures in the functioning of
IS were caused by software defects (software). Software defects may prevent the implementation of
reconfiguration procedures, which are mostly performed by the corresponding software modules.
Therefore, software reliability assessment has become an integral part of projects to create
functionally stable IS.</p>
      <p>
        IS software tools involved in management processes process a huge amount of information, and it
is practically impossible to identify all connections and ways of data processing, even for standard
rather simple programs. Therefore, implementing an experimental assessment of the real reliability of
IS software, which is a complex combination of interacting software modules, is a rather
timeconsuming and difficult to automate task. Although it should be noted that today considerable
experience has been accumulated in assessing the reliability of software used in IS of critical areas
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In such areas, it is impossible to use the functioning of real objects for testing and evaluating the
reliability of software, and as a result, methods and means of modeling the external environment have
become useful for the automated generation of tests for evaluating the reliability of IS software. On
the basis of software models and components of real IS, simulation test benches are created, which
provide an opportunity to evaluate the reliability of the functioning of specific software under
conditions of regular and critical external influences that correspond to the real characteristics of the
external environment.
      </p>
      <p>
        Reliability of IS software is usually defined as the ability of a set of programs to perform specified
functions while maintaining the value of certain indicators within specified limits over time. There are
technologies for the development of reliable software complexes, proposed methods and models for
researching their reliability and safety, but a single universal approach to solving the problem of
creating reliable software has not been proposed [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The reason for this is the uniqueness of each
software complex.
      </p>
      <p>
        Each project should purposefully create a coordinated set of methods and means of ensuring the
given reliability of the software under the conditions of a realistically possible reduction in the level
of defects and program development errors. It is necessary to study the specific factors that affect the
quality of the functioning of the software from the side of actually existing and potentially possible
defects in the programs implemented in the IS [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>The basic principles of creating reliable software can be divided into four groups: avoiding,
detecting, correcting and making errors. Avoidance of errors combines principles, the observance of
which will ensure the minimization of errors in the software development process. Error detection
relies on error correction mechanisms. When, during the testing process, errors are detected in the
components or the software as a whole, then the components or the software as a whole are refined.
Testing continues until the specified reliability index is reached. Error tolerance involves the means
and methods of ensuring the correct execution of a given function in the presence of errors.</p>
      <p>In the general case, IS software is a collection of individual program modules (formally
independent parts) connected by probabilistic links. Such modules can be software complexes,
individual programs, blocks or even operators. The number of software modules can be significant, so
modules are grouped by type. Each type contains software modules that are similar in properties, in
particular, in terms of reliability. Knowing the structure of IS software, which is a collection of
software modules with known reliability indicators, applying the decomposition method, it is possible
to assess the reliability of IS software. So, for example, let's assume that the IS software is a set of M
program modules, then, taking into account the structure of the software and the operation of the IS,
you can build a corresponding stochastic graph that will have M+2 vertices. Vertex 0 will be the
initial (loop), and vertex M+1 will be the final (drain). Each software module is called to work with a
given probability, which is determined based on the task of operation or initial data. The probability
of error-free operation of IS software can be determined by the probability of error-free operation of
all software modules and the probability of transitions between them. Usually, the reliability
indicators of the software modules that are part of the software, as well as their probabilistic
dependencies in the stochastic graph, are known. So, under these conditions, it is possible to assess,
for example, the reliability of such complex software as in automated system of organization
management, using the decomposition method.</p>
      <p>Reliability control of software components is necessary at all stages of the IS life cycle. One of the
effective ways to increase the reliability of software is the standardization of technological processes
and objects of design, development and support of programs. Prevention of errors in software is
possible thanks to high-quality documentation in the process of developing software modules and
software as a whole.</p>
    </sec>
    <sec id="sec-5">
      <title>7. Conclusions </title>
      <p>Functional stability is an important characteristic of IS, especially for those involved in management
processes. The indicator of the functional stability of the IS significantly depends on the basis on
which the system is created, in particular, the use of multi-version, the principles of multi-parameter
adaptation to failures, increasing the reliability of IS software etc. "Successful" functional overlapping
and distribution of functions and resources between IS components allows to increase the indicator of
functional stability, thanks to the organization and implementation of dynamic reconfiguration
procedures.</p>
    </sec>
    <sec id="sec-6">
      <title>8. Acknowledgements </title>
      <p>The authors are grateful to colleagues who took part in discussions on research materials at scientific
and scientific-technical seminars and conferences.</p>
    </sec>
    <sec id="sec-7">
      <title>9. References </title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Oleksandr</given-names>
            <surname>Dodonov</surname>
          </string-name>
          , Olena Gorbachyk,
          <string-name>
            <given-names>Maryna</given-names>
            <surname>Kuznietsova</surname>
          </string-name>
          .
          <source>Dynamic Reconfiguration in Automated Organizational Management Systems. In: CEUR Workshop Proceedings</source>
          vol.
          <volume>2859</volume>
          , pp.
          <fpage>129</fpage>
          -
          <lpage>141</lpage>
          (
          <year>2020</year>
          ). http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2859</volume>
          /paper11.pdf
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Kharchenko</surname>
            ,
            <given-names>V.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.V</given-names>
          </string-name>
          . (Eds.):
          <article-title>Provision of Functional Safety of Critical Informationcontrol Systems</article-title>
          . Konstanta,
          <string-name>
            <surname>Kharkov</surname>
          </string-name>
          (
          <year>2019</year>
          ). 272 p.
          <article-title>(in Ukrainian)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Korolev</surname>
            ,
            <given-names>A.N.</given-names>
          </string-name>
          :
          <article-title>Functional Stability of Navigation and Information Systems</article-title>
          . In: University news.
          <source>Instrument making</source>
          , vol
          <volume>61</volume>
          , no.
          <issue>7</issue>
          . Pp.
          <volume>559</volume>
          -
          <fpage>565</fpage>
          (
          <year>2018</year>
          )
          <article-title>(in Russian)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>H.</given-names>
            <surname>Frank</surname>
          </string-name>
          and
          <string-name>
            <given-names>I.T.</given-names>
            <surname>Frisch</surname>
          </string-name>
          <string-name>
            <surname>Networks</surname>
          </string-name>
          ,
          <source>Communication and Flows</source>
          . Translation from English. Ed.
          <string-name>
            <given-names>D.A.</given-names>
            <surname>Pospelov</surname>
          </string-name>
          . Svyaz, Moscow (
          <year>1978</year>
          ). 448 p.
          <article-title>(in Russian)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Letychevsky</surname>
            <given-names>O.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peschanenko</surname>
            <given-names>V.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hryniuk</surname>
            <given-names>Y.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Radchenko</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Yu</surname>
          </string-name>
          .,
          <string-name>
            <surname>Yakovlev</surname>
            <given-names>V.M.</given-names>
          </string-name>
          <article-title>An Overview of the Modern Methods of Security and Protection of Software Systems // Cybernetics and system analysis</article-title>
          ,
          <source>vol. 55</source>
          , pp.
          <fpage>840</fpage>
          -
          <lpage>850</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Shen Z.</given-names>
            ,
            <surname>Chen</surname>
          </string-name>
          <string-name>
            <surname>S.:</surname>
          </string-name>
          <article-title>A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques</article-title>
          .
          <source>Security and Communication Networks</source>
          , vol.
          <year>2020</year>
          .
          <string-name>
            <surname>Article</surname>
            <given-names>ID</given-names>
          </string-name>
          8858010 (
          <year>2020</year>
          ). https://doi.org/10.1155/
          <year>2020</year>
          /8858010.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>