ENIGMA: An explainable digital twin security solution for cyber-physical systems

被引:26
|
作者
Suhail, Sabah [1 ]
Iqbal, Mubashar [2 ]
Hussain, Rasheed [3 ]
Jurdak, Raja [4 ]
机构
[1] Vienna Univ Econ & Business, Vienna, Austria
[2] Univ Tartu, Tartu, Estonia
[3] Univ Bristol, Bristol, England
[4] Queensland Univ Technol, Brisbane, Australia
关键词
Cyber-physical system (CPS); Cybersecurity awareness; Digital twins (DTs); eXplainable AI (XAI); Gamification; Industry; 5; 0; METAVERSE;
D O I
10.1016/j.compind.2023.103961
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Digital Twins (DTs), being the virtual replicas of their physical counterparts, share valuable knowledge of the underlying physical processes and act as data acquisition and dissemination sources to Cyber-Physical System (CPS). Moreover, without obstructing the ongoing operations, DTs also provide an assessment platform for evaluating the operational behavior and security of the CPS. Therefore, they become a potential source of data breaches and a broad attack surface for attackers to launch covert attacks. To detect and mitigate security loopholes in DTs, one of the potential solutions is to leverage a gamification approach that can assess the security level of DTs while providing security analysts with a controlled and supportive virtual training environment. Artificial Intelligence/Machine Learning (AI/ML)-based approaches can complement the idea of security orchestration and automation in the gamification approach. However, AI/ML-based DTs security solutions are generally constrained by the lack of transparency of AI operations, which results in less confidence in the decisions made by the AI models. To address the explainable security challenges of DTs, this article proposes a gamification approach called sEcuriNg dIgital twins through GaMification Approach (ENIGMA). While leveraging DTs as an offensive security platform, ENIGMA provides gaming scenarios to assess DTs' security and train security analysts. The game players within ENIGMA are humans (the attacker team) and AI agents (the defender team). Furthermore, ENIGMA is supported by an eXplainable AI (XAI)-based DT security assessment model that explains the decisions made based on the SHAP values by the AI model on attack vectors for the defender team, i.e., the AI agent. The SHAP values illustrate the contribution of different features towards predicting the outcome of attack vectors. This explanation can help security analysts to take security measures based on reasoned and trustworthy decisions. Finally, experimental validation has been carried out to demonstrate the viability of ENIGMA.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Analysis of security in cyber-physical systems
    CHEN Jie
    ZHANG Fan
    SUN Jian
    Science China(Technological Sciences), 2017, (12) : 1975 - 1977
  • [22] Cyber-Physical Systems: A Security Perspective
    Konstantinou, Charalambos
    Maniatakos, Michail
    Saqib, Fareena
    Hu, Shiyan
    Plusquellic, Jim
    Jin, Yier
    2015 20TH IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2015,
  • [23] Cyber-Physical Systems Security and Privacy
    Henkel, Jorg
    IEEE DESIGN & TEST, 2017, 34 (04) : 4 - 4
  • [24] A Survey on Cyber-Physical Systems Security
    Yu, Zhenhua
    Gao, Hongxia
    Cong, Xuya
    Wu, Naiqi
    Song, Houbing Herbert
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (24) : 21670 - 21686
  • [25] Security Enumerations for Cyber-Physical Systems
    Schlette, Daniel
    Menges, Florian
    Baumer, Thomas
    Pernul, Guenther
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIV, DBSEC 2020, 2020, 12122 : 64 - 76
  • [26] Modeling security in cyber-physical systems
    Burmester, Mike
    Magkos, Ernmanouil
    Chrissikopoulos, Vassilis
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (3-4) : 118 - 126
  • [27] Security Games for Cyber-Physical Systems
    Vigo, Roberto
    Bruni, Alessandro
    Yuksel, Ender
    SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 17 - 32
  • [28] Analysis of security in cyber-physical systems
    CHEN Jie
    ZHANG Fan
    SUN Jian
    Science China(Technological Sciences), 2017, 60 (12) : 1975 - 1977
  • [29] Security Synthesis for Cyber-Physical Systems
    Li, Jitao
    Wang, Zhenhua
    Shen, Yi
    Xie, Lihua
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (02): : 1027 - 1037
  • [30] Security and networking for cyber-physical systems
    Wu, Shaoen
    Wang, Honggang
    Wu, Dalei
    Chatzimisios, Periklis
    Chen, Zhigang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (09) : 807 - 807