Securing critical infrastructures with a cybersecurity digital twin

被引:8
|
作者
Masi, Massimiliano [1 ]
Sellitto, Giovanni Paolo
Aranha, Helder
Pavleska, Tanja [2 ]
机构
[1] Autostrade Per LItalia SpA, IT & Digital Transformat, Via Bergamini, I-00159 Rome, Italy
[2] Jozef Stefan Inst, Lab Open Syst & Networks, Jamova cesta 39, Ljubljana 1000, Slovenia
来源
SOFTWARE AND SYSTEMS MODELING | 2023年 / 22卷 / 02期
关键词
Enterprise architecture; Reference architecture; Cybersecurity view; Digital twin; Threat modeling; Critical infrastructure; Transportation;
D O I
10.1007/s10270-022-01075-0
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the diffusion of integrated design environments and tools for visual threat modeling for critical infrastructures, the concept of Digital Twin (DT) is gaining momentum in the field of cybersecurity. Its main use is for enabling attack simulations and evaluation of countermeasures, without causing outage of the physical system. However, the use of a DT is considered foremost as a facilitator of system operation rather than an integral part of its architecture design. In this work, we introduce a specific architecture view in the system representation, called Cybersecurity View. From it, we derive a cybersecurity Digital Twin as part of the security-by-design practice for Industrial Automation and Control Systems used in Critical Infrastructures. Not only this digital twin serves the purpose of simulating cyber-attacks and devising countermeasures, but its design and function are also directly tied to the architecture model of the system for which the cybersecurity requirements are posed. Moreover, this holds regardless of whether the model is generated as part of the development cycle or through an empirical observation of the system as-is. With this, we enable the identification of adequate cybersecurity measures for the system, while improving the overall system design. To demonstrate the practical usefulness of the proposed methodology, its application is illustrated through two real-world use cases: the Cooperative Intelligent Transport System (C-ITS) and the Road tunnel scenario.
引用
收藏
页码:689 / 707
页数:19
相关论文
共 50 条
  • [41] Enterprise architecture modeling for cybersecurity analysis in critical infrastructures -A systematic literature review
    Jiang, Yuning
    Jeusfeld, Manfred A.
    Mosaad, Michael
    Oo, Nay
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 46
  • [42] China's cybersecurity legislation, it's relevance to critical infrastructures and the challenges it faces
    Guo, Meirong
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 22 : 139 - 149
  • [43] A Blockchain-Based Architecture for Enabling Cybersecurity in the Internet-of-Critical Infrastructures
    Ragab, Mahmoud
    Altalbe, Ali
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1579 - 1592
  • [44] Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis
    Wang, Hao
    Lau, Nathan
    Gerdes, Ryan M.
    HUMAN FACTORS, 2018, 60 (05) : 699 - 718
  • [45] Hardware Root-of-Trust Support for Operational Technology Cybersecurity in Critical Infrastructures
    Ehret, Alan
    Moore, Peter
    Stojkov, Milan
    Kinsy, Michel A.
    2023 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE, HPEC, 2023,
  • [46] Designing a unique Digital Twin for linear infrastructures lifecycle management
    Tchana, Yvan
    Ducellier, Guillaume
    Remy, Sebastien
    29TH CIRP DESIGN CONFERENCE 2019, 2019, 84 : 545 - 549
  • [47] C-SEC (Cyber SCADA Evaluation Capability): Securing Critical Infrastructures
    Romero-Mariona, Jose
    Kline, Megan
    Miguel, John San
    2015 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2015, : 38 - 38
  • [48] Securing information technology infrastructures
    Rabinovitch, E
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 60 - 64
  • [49] Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT
    Yu, Keping
    Tan, Liang
    Mumtaz, Shahid
    Al-Rubaye, Saba
    Al-Dulaimi, Anwer
    Bashir, Ali Kashif
    Khan, Farrukh Aslam
    IEEE COMMUNICATIONS MAGAZINE, 2021, 59 (10) : 76 - 82
  • [50] Securing critical information and communication infrastructures through electric power grid independence
    Allen, W
    Fletcher, DW
    Fellhoelter, KJ
    INTELEC'03: POWERING THE BROADBAND NETWORK, PROCEEDINGS, 2003, : 170 - 177