Securing critical infrastructures with a cybersecurity digital twin

被引:14
|
作者
Masi, Massimiliano [1 ]
Sellitto, Giovanni Paolo
Aranha, Helder
Pavleska, Tanja [2 ]
机构
[1] Autostrade Per LItalia SpA, IT & Digital Transformat, Via Bergamini, I-00159 Rome, Italy
[2] Jozef Stefan Inst, Lab Open Syst & Networks, Jamova cesta 39, Ljubljana 1000, Slovenia
来源
SOFTWARE AND SYSTEMS MODELING | 2023年 / 22卷 / 02期
关键词
Enterprise architecture; Reference architecture; Cybersecurity view; Digital twin; Threat modeling; Critical infrastructure; Transportation;
D O I
10.1007/s10270-022-01075-0
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the diffusion of integrated design environments and tools for visual threat modeling for critical infrastructures, the concept of Digital Twin (DT) is gaining momentum in the field of cybersecurity. Its main use is for enabling attack simulations and evaluation of countermeasures, without causing outage of the physical system. However, the use of a DT is considered foremost as a facilitator of system operation rather than an integral part of its architecture design. In this work, we introduce a specific architecture view in the system representation, called Cybersecurity View. From it, we derive a cybersecurity Digital Twin as part of the security-by-design practice for Industrial Automation and Control Systems used in Critical Infrastructures. Not only this digital twin serves the purpose of simulating cyber-attacks and devising countermeasures, but its design and function are also directly tied to the architecture model of the system for which the cybersecurity requirements are posed. Moreover, this holds regardless of whether the model is generated as part of the development cycle or through an empirical observation of the system as-is. With this, we enable the identification of adequate cybersecurity measures for the system, while improving the overall system design. To demonstrate the practical usefulness of the proposed methodology, its application is illustrated through two real-world use cases: the Cooperative Intelligent Transport System (C-ITS) and the Road tunnel scenario.
引用
收藏
页码:689 / 707
页数:19
相关论文
共 50 条
  • [31] Functional cyber-resilience - Extending the cybersecurity paradigm in critical infrastructures
    de Haan, Johannes
    2023 IEEE/ACM 4TH INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS, ENCYCRIS, 2023, : 17 - 22
  • [32] Cybersecurity-aware log management system for critical water infrastructures
    Balta, Deniz Dural
    Kac, Seda Balta
    Balta, Musa
    Ogur, Nur Banu
    Eken, Suleyman
    APPLIED SOFT COMPUTING, 2025, 169
  • [33] Experiential Learning Through Immersive XR: Cybersecurity Education for Critical Infrastructures
    Lee, Anthony
    King, Kenneth
    Gracanin, Denis
    Azab, Mohamed
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST, PT II, HCI-CPT 2024, 2024, 14729 : 56 - 69
  • [34] Evaluation of Cybersecurity Management Controls and Metrics of Critical Infrastructures: A Literature Review Considering the NIST Cybersecurity Framework
    Krumay, Barbara
    Bernroider, Edward W. N.
    Walser, Roman
    SECURE IT SYSTEMS, 2018, 11252 : 369 - 384
  • [35] Securing SCADA-based Critical Infrastructures: Challenges and Open Issues
    Tariq, Noshina
    Asim, Muhammad
    Khan, Farrukh Aslam
    16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 : 612 - 617
  • [36] Securing Critical IoT Infrastructures With Blockchain-Supported Federated Learning
    Otoum, Safa
    Al Ridhawi, Ismaeel
    Mouftah, Hussein
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2592 - 2601
  • [37] A Novel Method for Securing Critical Infrastructures by Detecting Hidden Flows of Data
    Benedetto, F.
    Giunta, G.
    Liguori, A.
    Wacker, A.
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 648 - 654
  • [38] A Methodological Approach to Securing Cyber-Physical Systems for Critical Infrastructures
    Calabro, Antonello
    Cambiaso, Enrico
    Cheminod, Manuel
    Bertolotti, Ivan Cibrario
    Durante, Luca
    Forestiero, Agostino
    Lombardi, Flavio
    Manco, Giuseppe
    Marchetti, Eda
    Orlando, Albina
    Papuzzo, Giuseppe
    FUTURE INTERNET, 2024, 16 (11)
  • [39] Cybersecurity: a critical priority for digital mental health
    Inkster, Becky
    Knibbs, Catherine
    Bada, Maria
    FRONTIERS IN DIGITAL HEALTH, 2023, 5
  • [40] Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids
    Coppolino, Luigi
    Nardone, Roberto
    Petruolo, Alfredo
    Romano, Luigi
    Souvent, Andrej
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,