@ARTICLE{Lakhno_Valerii_Development_2023, author={Lakhno, Valerii and Alimseitova, Zhuldyz and Kalaman, Yerbolat and Kryvoruchko, Olena and Desiatko, Alona and Kaminskyi, Serhii}, volume={vol. 69}, number={No 3}, journal={International Journal of Electronics and Telecommunications}, pages={475-483}, howpublished={online}, year={2023}, publisher={Polish Academy of Sciences Committee of Electronics and Telecommunications}, abstract={A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology. In particular, a mathematical model was presented based on the use of the apparatus of probability theory to calculate the vulnerability coefficient. This coefficient allows one to assess the level of information security of the OBI network. Criteria for assessing the acceptable and critical level of risks for information security were proposed as well. At the second stage of the methodology development of the IS DCN system, methods of simulation and virtualization of the components of the IS DCN were used. In the course of experimental studies, a model of a protected DCN has been built. In the experimental model, network devices and DCN IS components were emulated on virtual machines (VMs). The DCN resources were reproduced using the Proxmox VE virtualization system. IPS Suricata was deployed on RCS hosts running PVE. Splunk was used as SIEM. It has been shown that the proposed methodology for the formation of the IS system for DCN and the model of the vulnerability coefficient makes it possible to obtain a quantitative assessment of the levels of vulnerability of DCN OBI.}, type={Article}, title={Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object}, URL={http://ochroma.man.poznan.pl/Content/128285/PDF-MASTER/9-4079-Lakhno-sk.pdf}, doi={10.24425/ijet.2023.146495}, keywords={information security, informatization object, distributed computing network, mathematical model, vulnerability coefficient, virtualization, IDS, SIEM}, }