Digital-Twin-Based Security Analytics for the Internet of Things

被引:9
作者
Empl, Philip [1 ]
Pernul, Guenther [1 ]
机构
[1] Univ Regenburg, Chair Informat Syst, D-93053 Regensburg, Germany
关键词
digital twin; security analytics; internet of things; cybersecurity;
D O I
10.3390/info14020095
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although there are numerous advantages of the IoT in industrial use, there are also some security problems, such as insecure supply chains or vulnerabilities. These lead to a threatening security posture in organizations. Security analytics is a collection of capabilities and technologies systematically processing and analyzing data to detect or predict threats and imminent incidents. As digital twins improve knowledge generation and sharing, they are an ideal foundation for security analytics in the IoT. Digital twins map physical assets to their respective virtual counterparts along the lifecycle. They leverage the connection between the physical and virtual environments and manage semantics, i.e., ontologies, functional relationships, and behavioral models. This paper presents the DT2SA model that aligns security analytics with digital twins to generate shareable cybersecurity knowledge. The model relies on a formal model resulting from previously defined requirements. We validated the DT2SA model with a microservice architecture called Twinsight, which is publicly available, open-source, and based on a real industry project. The results highlight challenges and strategies for leveraging cybersecurity knowledge in IoT using digital twins.
引用
收藏
页数:20
相关论文
共 43 条
[1]  
Ackoff R. L., 1989, J. Appl. Syst. Anal., V16, P3
[2]   Intrusion Detection in Digital Twins for Industrial Control Systems [J].
Akbarian, Fatemeh ;
Fitzgerald, Emma ;
Kihl, Maria .
2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2020, :338-343
[3]   Digital Twin: A Comprehensive Survey of Security Threats [J].
Alcaraz, Cristina ;
Lopez, Javier .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (03) :1475-1503
[4]  
Alguliyev R., 2014, 8 IEEE INT C APPL IN, DOI DOI 10.1109/ICAICT.2014.7035946
[5]  
Ardagna C., 2021, ENISA threat Landscape 2021
[6]  
Atalay M, 2020, 2020 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR INDUSTRY 4.0 & IOT (METROIND4.0&IOT), P435, DOI [10.1109/metroind4.0iot48571.2020.9138264, 10.1109/MetroInd4.0IoT48571.2020.9138264]
[7]   A Survey on Digital Twin: Definitions, Characteristics, Applications, and Design Implications [J].
Barricelli, Barbara Rita ;
Casiraghi, Elena ;
Fogli, Daniela .
IEEE ACCESS, 2019, 7 :167653-167671
[8]   Bridging Knowledge Gaps in Security Analytics [J].
Boehm, Fabian ;
Vielberth, Manfred ;
Pernul, Guenther .
ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, :98-108
[9]  
Boschert S., 2018, P TMCE PALM GRAN CAN, P209, DOI [10.17560/atp.v60i10.2371, DOI 10.17560/ATP.V60I10.2371]
[10]   Big Data Analytics for Security [J].
Cardenas, Alvaro A. ;
Manadhata, Pratyusa K. ;
Rajan, Sreeranga P. .
IEEE SECURITY & PRIVACY, 2013, 11 (06) :74-76