Towards Security-Aware Virtual Environments for Digital Twins

被引:83
|
作者
Eckhart, Matthias [1 ]
Ekelhart, Andreas [2 ]
机构
[1] TU Wien, Inst Informat Syst Engn, Christian Doppler Lab SQI, Vienna, Austria
[2] SBA Res, Vienna, Austria
基金
奥地利科学基金会;
关键词
Cyber-physical systems; industrial control systems; digital twin; simulation; security monitoring; AutomationML; SYSTEM;
D O I
10.1145/3198458.3198464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital twins open up new possibilities in terms of monitoring, simulating, optimizing and predicting the state of cyber-physical systems (CPSs). Furthermore, we argue that a fully functional, virtual replica of a CPS can also play an important role in securing the system. In this work, we present a framework that allows users to create and execute digital twins, closely matching their physical counterparts. We focus on a novel approach to automatically generate the virtual environment from specification, taking advantage of engineering data exchange formats. From a security perspective, an identical (in terms of the system's specification), simulated environment can be freely explored and tested by security professionals, without risking negative impacts on live systems. Going a step further, security modules on top of the framework support security analysts in monitoring the current state of CPSs. We demonstrate the viability of the framework in a proof of concept, including the automated generation of digital twins and the monitoring of security and safety rules.
引用
收藏
页码:61 / 72
页数:12
相关论文
共 50 条
  • [1] Towards security-aware virtual network embedding
    Liu, Shuhao
    Cai, Zhiping
    Xu, Hong
    Xu, Ming
    [J]. COMPUTER NETWORKS, 2015, 91 : 151 - 163
  • [2] Towards Security-Aware Virtual Server Migration Optimization to the Cloud
    Zhang, Bowu
    Hwang, Jinho
    Ma, Liran
    Wood, Timothy
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, 2015, : 71 - 80
  • [3] Security-aware Virtual Network Embedding
    Liu, Shuhao
    Cai, Zhiping
    Xu, Hong
    Xu, Ming
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 834 - 840
  • [4] Towards Security-aware Mutation Testing
    Loise, Thomas
    Devroey, Xavier
    Perrouin, Gilles
    Papadakis, Mike
    Heymans, Patrick
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 97 - 102
  • [5] Efficient Security-Aware Virtual Memory Management
    Amirsoufi, Rahmatollah
    Taghiloo, Majid
    Ahmadi, Armin
    [J]. 2009 INTERNATIONAL CONFERENCE OF SOFT COMPUTING AND PATTERN RECOGNITION, 2009, : 208 - +
  • [6] A Framework for Security-Aware Virtual Network Embedding
    Wang, Yang
    Phanvu Chau
    Chen, Fuyu
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [7] Towards Establishing Security-Aware Cloud Markets
    Wenge, Olga
    Schuller, Dieter
    Steinmetz, Ralf
    [J]. 2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 1027 - 1032
  • [8] Inherent Security-aware Resource Utilizing Methodology for Cloud Environments
    Krishnan, C. Gopala
    Julie, E. Golden
    Robinson, Y. Harold
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (01) : 9 - 26
  • [9] Inherent Security-aware Resource Utilizing Methodology for Cloud Environments
    C. Gopala Krishnan
    E. Golden Julie
    Y. Harold Robinson
    [J]. Wireless Personal Communications, 2021, 120 : 9 - 26
  • [10] Enabling Security-Aware Virtual Machine Placement in IaaS Clouds
    Yuchi, Xuebiao
    Shetty, Sachin
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1554 - 1559