Securing critical infrastructures with a cybersecurity digital twin

被引:22
作者
Masi, Massimiliano [1 ]
Sellitto, Giovanni Paolo
Aranha, Helder
Pavleska, Tanja [2 ]
机构
[1] Autostrade Per LItalia SpA, IT & Digital Transformat, Via Bergamini, I-00159 Rome, Italy
[2] Jozef Stefan Inst, Lab Open Syst & Networks, Jamova cesta 39, Ljubljana 1000, Slovenia
关键词
Enterprise architecture; Reference architecture; Cybersecurity view; Digital twin; Threat modeling; Critical infrastructure; Transportation;
D O I
10.1007/s10270-022-01075-0
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the diffusion of integrated design environments and tools for visual threat modeling for critical infrastructures, the concept of Digital Twin (DT) is gaining momentum in the field of cybersecurity. Its main use is for enabling attack simulations and evaluation of countermeasures, without causing outage of the physical system. However, the use of a DT is considered foremost as a facilitator of system operation rather than an integral part of its architecture design. In this work, we introduce a specific architecture view in the system representation, called Cybersecurity View. From it, we derive a cybersecurity Digital Twin as part of the security-by-design practice for Industrial Automation and Control Systems used in Critical Infrastructures. Not only this digital twin serves the purpose of simulating cyber-attacks and devising countermeasures, but its design and function are also directly tied to the architecture model of the system for which the cybersecurity requirements are posed. Moreover, this holds regardless of whether the model is generated as part of the development cycle or through an empirical observation of the system as-is. With this, we enable the identification of adequate cybersecurity measures for the system, while improving the overall system design. To demonstrate the practical usefulness of the proposed methodology, its application is illustrated through two real-world use cases: the Cooperative Intelligent Transport System (C-ITS) and the Road tunnel scenario.
引用
收藏
页码:689 / 707
页数:19
相关论文
共 57 条
[1]  
Agence Nationale de la Securite des Systemes d'Information, 2014, PRACT CAS ROAD TUN 1
[2]  
Andersen C.A., 2003, COST EFFECTIVENESS P, V134, P341
[3]  
Anderson K., 2007, P 12 AUSTR WORKSHOP, V86, P3
[4]  
[Anonymous], 2016, ISO/IEC 20922:2016 information technology-message queuing telemetry transport (mqtt) v3.1.1. 2023-08
[5]  
[Anonymous], 2012, Technical Report
[6]  
[Anonymous], 2021, INTELLIGENT TRANSPOR
[7]  
[Anonymous], 2016, 91345 EV DIFN DIN SP
[8]  
[Anonymous], 2014, SGCGM490 CEN CENELEC
[9]  
[Anonymous], 2018, CyberFactory#1-Securing the Industry 4.0 with cyber-ranges and digital twins, DOI DOI 10.1109/WFCS.2018.8402377
[10]  
[Anonymous], 2014, HLTH INF IHE GLOB 1