Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence

被引:4
|
作者
Dietz, Marietheres [1 ]
Schlette, Daniel [1 ]
Pernul, Gunther [1 ]
机构
[1] Univ Regensburg, Chair Informat Syst, Regensburg, Germany
关键词
digital twin; cyber threat intelligence; simulation; security analysis;
D O I
10.1109/COMPSAC54236.2022.00129
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Understanding cybersecurity threats, attacks, and incidents is crucial for organizations to perform preventive or reactive measures. Nevertheless, detailed Cyber Threat Intelligence (CTI) is reluctantly shared. Digital twins, the virtual counterparts of real-world assets, offer security simulation capabilities. The simulation of attack scenarios on industrial control systems (ICS) with digital twins yields valuable threat information. In our work, we outline the systematic steps towards a structured threat report starting with digital twin security simulations: We first present the course of action and define formal requirements for framework deployment. We then conduct an attack simulation with a prototypical digital twin application to evaluate our framework. Using the STIX2.1 standard, we assist CTI generation by providing utility tools guiding through the process steps. Our experimental results show that a STIX2.1 CTI report can be systematically constructed with the opportunity to customize according to the use case at hand. Adding digital twin security simulations to the list of CTI sources can provide shareable CTI and help organizations improve their security posture.
引用
收藏
页码:789 / 797
页数:9
相关论文
共 50 条
  • [1] Digital twin for maximum cyber security
    Krüger J.
    [J]. ZWF Zeitschrift fuer Wirtschaftlichen Fabrikbetrieb, 2020, 115 : 29 - 31
  • [2] Cyber Security Threat Intelligence Monitoring and Classification
    Wang, Bo-Xiang
    Chen, Jiann-Liang
    Yu, Chiao-Lin
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2021, : 70 - 72
  • [3] Cyber threat intelligence for critical infrastructure security
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Mori, Paolo
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23):
  • [4] Using Cyber Threat Intelligence in SDN Security
    Yurekten, Ozgur
    Demirci, Mehmet
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 377 - 382
  • [5] Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI)
    Aliyu, Aliyu
    He, Ying
    Yevseyeva, Iryna
    Luo, Cunjin
    [J]. 2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [6] Towards Collaborative Cyber Threat Intelligence for Security Management
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Dimitrakos, Theo
    [J]. ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 339 - 346
  • [7] A Summary of the Development of Cyber Security Threat Intelligence Sharing
    Du, Lili
    Fan, Yaqin
    Zhang, Lvyang
    Wang, Lianying
    Sun, Tianhang
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2020, 12 (04) : 54 - 67
  • [8] Cyber Threat Intelligence on Blockchain: A Systematic Literature Review
    Chatziamanetoglou, Dimitrios
    Rantos, Konstantinos
    [J]. COMPUTERS, 2024, 13 (03)
  • [9] Cyber Security Threat Intelligence Sharing Model Based on Blockchain
    Huang K.
    Lian Y.
    Feng D.
    Zhang H.
    Liu Y.
    Ma X.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (04): : 836 - 846
  • [10] Offensive Security: Cyber Threat Intelligence Enrichment With Counterintelligence and Counterattack
    Rana, Muhammad Usman
    Ellahi, Osama
    Alam, Masoom
    Webber, Julian L.
    Mehbodniya, Abolfazl
    Khan, Shawal
    [J]. IEEE ACCESS, 2022, 10 : 108760 - 108774