Analyzing the impact of cyber-attacks on the performance of digital twin-based industrial organizations

被引:5
作者
Mustofa, Ridwan [1 ]
Rafiquzzaman, Md. [1 ]
Hossain, Niamat Ullah Ibne [2 ]
机构
[1] Khulna Univ Engn & Technol, Dept Ind Engn & Management, Khulna 9203, Bangladesh
[2] Arkansas State Univ, Coll Engn & Comp Sci, Engn Management Dept, Jonesboro, AR 72467 USA
关键词
Digital twin; Cyber-attack; Dynamic Bayesian network; Discrete-time-Markov-chain; Reliability; Resilience; BAYESIAN NETWORK; SYSTEM; MODEL;
D O I
10.1016/j.jii.2024.100633
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Digital twin is a virtual copy of their "real-world counterparts", which refer to physical objects, systems, or entities that exist in the physical world. They share valuable information about how the system works by connecting the replica with the real product via the internet and sensors. In digital twin organizations, industrial control systems and the internet are the main sources of data collection and synchronization, resulting in an increase in cyber-attacks. As a result, they could cause data leaks and be used by hackers to launch attacks without being detected. Researching the appropriate defenses against such attacks is of paramount interest. To that end, in this study, we build an integrated model utilizing the combination of a Dynamic Bayesian Network (DBN) and a Discrete-Time Markov Chain (DTMC) to analyze the considerable consequences of cyberattacks on a digital twin-based organization over different time period. DTMC models recovery and vulnerability for DTbased organizations, and then it is paired with the DBN model to simulate the cyberattack propagation behavior in the organization's IT performance. Next, we calculate the organization's work level and total expected utility under two different cyber-attack scenarios to determine its IT performance and financial behavior. Finally, we evaluate the organization's IT system's reliability and resilience after implementing two prevention mechanisms. Result indicates that Distributed Denial-of-Service (DDoS) cyberattack can cause more destruction to the digital twin organization's IT system than a malware attack in terms of cyberattack propagation, work and utility level, reliability, and resilience capability. The findings of the analysis hold practical applicability in real-world settings, enabling the identification of high-risk cyberattacks within DT-based organizations, the analysis and prediction of an organization's IT performance during actual cyberattacks, and the formulation of effective prevention strategies to address cyber security concerns within DT-based organizations.
引用
收藏
页数:19
相关论文
共 74 条
[61]   Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges [J].
Suhail, Sabah ;
Hussain, Rasheed ;
Jurdak, Raja ;
Oracevic, Alma ;
Salah, Khaled ;
Hong, Choong Seon ;
Matulevicius, Raimundas .
ACM COMPUTING SURVEYS, 2022, 54 (11S)
[62]   Digital twin-driven product design framework [J].
Tao, Fei ;
Sui, Fangyuan ;
Liu, Ang ;
Qi, Qinglin ;
Zhang, Meng ;
Song, Boyang ;
Guo, Zirong ;
Lu, Stephen C. -Y. ;
Nee, A. Y. C. .
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2019, 57 (12) :3935-3953
[63]   Modelling and assessing seismic resilience of critical housing infrastructure system by using dynamic Bayesian approach [J].
Tasmen, Taiyba ;
Sen, Mrinal Kanti ;
Hossain, Niamat Ullah Ibne ;
Kabir, Golam .
JOURNAL OF CLEANER PRODUCTION, 2023, 428
[64]  
Team V.R., 2012, Verizon 2012 data breach investigations report
[65]   A Dynamic Bayesian Network-based approach to Resilience Assessment of Engineered Systems [J].
Tong, Qi ;
Yang, Ming ;
Zinetullina, Altyngul .
JOURNAL OF LOSS PREVENTION IN THE PROCESS INDUSTRIES, 2020, 65
[66]  
Van Der Meer R., 2022, Robert and Walls, Lesley, modelling framework to aid a decision-maker assess supply chain resilience to source stress under uncertainty and limited visibility
[67]   Ipsative measurement and the analysis of organizational values: an alternative approach for data analysis [J].
van Eijnatten, Frans M. ;
van der Ark, L. Andries ;
Holloway, Sjana S. .
QUALITY & QUANTITY, 2015, 49 (02) :559-579
[68]   A Digital Twin-Based Cyber Range for SOC Analysts [J].
Vielberth, Manfred ;
Glas, Magdalena ;
Dietz, Marietheres ;
Karagiannis, Stylianos ;
Magkos, Emmanouil ;
Pernul, Guenther .
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 :293-311
[69]  
Wang C., 2007, HYBRID CAUSAL LOGIC
[70]  
Weber P., 2003, 5 IFAC S FAULT DETEC, P57