V. Lakhno, V. Malyukov, B. Akhmetov, B. Yagaliyeva, O. Kryvoruchko, A. Desiatko
{"title":"University Distributed Computer Network Vulnerability Assessment","authors":"V. Lakhno, V. Malyukov, B. Akhmetov, B. Yagaliyeva, O. Kryvoruchko, A. Desiatko","doi":"10.1109/SIST58284.2023.10223501","DOIUrl":null,"url":null,"abstract":"A methodology for evaluating information security (IS) for a distributed computer network (DCN) of a university (hereinafter referred to as UDCN) has been proposed. A mathematical model for calculating the UDCN vulnerability factor has been presented. The UDCN vulnerability coefficient makes it possible to assess its IS level at the UDCN design stage. The results of simulation modeling and virtualization of IS UDCN components have also been presented. In the course of simulation modeling, a model of a protected UDCN was designed and tested. In the experimental UDCN model, the network devices selected in the course of modeling the vulnerability coefficient were emulated on virtual machines (VMs). UDCN resources were reproduced using the Proxmox VE virtualization system. On the UDCN hosts running PVE, the Suricata Intrusion Detection System (IPS) was used. Splunk was used as SIEM.","PeriodicalId":367406,"journal":{"name":"2023 IEEE International Conference on Smart Information Systems and Technologies (SIST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Smart Information Systems and Technologies (SIST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIST58284.2023.10223501","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A methodology for evaluating information security (IS) for a distributed computer network (DCN) of a university (hereinafter referred to as UDCN) has been proposed. A mathematical model for calculating the UDCN vulnerability factor has been presented. The UDCN vulnerability coefficient makes it possible to assess its IS level at the UDCN design stage. The results of simulation modeling and virtualization of IS UDCN components have also been presented. In the course of simulation modeling, a model of a protected UDCN was designed and tested. In the experimental UDCN model, the network devices selected in the course of modeling the vulnerability coefficient were emulated on virtual machines (VMs). UDCN resources were reproduced using the Proxmox VE virtualization system. On the UDCN hosts running PVE, the Suricata Intrusion Detection System (IPS) was used. Splunk was used as SIEM.