Abstract
The transformation of previously isolated Critical Infrastructures (CIs) into intricate Systems-of-Systems has rendered them vulnerable to various threats. CIs are characterized by long life cycles and high availability requirements, which pose significant challenges in maintaining cybersecurity throughout their operational life cycle. Existing testing methodologies prove inadequate and may compromise the CI’s operational continuity. This paper proposes to shift testing activities to a Digital Twin (DT) connected to the CI. The DT provides a digital counterpart of the real system, enabling cost-effective testing without compromising operational integrity. For this approach, we present an enterprise architecture called the cybersecurity DT reference architecture. Through a camera surveillance system use case, we demonstrate the feasibility of this reference architecture, focusing on what-if testing using DT-enabled attack simulations. We show how to enhance decision-making when evaluating system configurations and how to deploy optimized configurations to the real system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
High-resolution images of the models available in: https://gitlab.utwente.nl/itapelto/whattwin.
- 3.
- 4.
References
CISA Cybersecurity & Infrastructure Security Agency: Critical infrastructure sectors. https://www.cisa.gov/critical-infrastructure-sectors. Accessed 08 Aug 2024
De Benedictis, A., Esposito, C., Somma, A.: Toward the adoption of secure cyber digital twins to enhance cyber-physical systems security. In: Vallecillo, A., Visser, J., Pérez-Castillo, R. (eds.) Quality of Information and Communications Technology, pp. 307–321. Springer, Cham (2022)
Dietz, M., Hageman, L., von Hornung, C., Pernul, G.: Employing digital twins for security-by-design system testing. In: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, pp. 97–106. Sat-CPS 2022. Association for Computing Machinery, New York (2022)
Hallmans, D., Sandström, K., Larsson, S., Nolte, T.: Challenges in providing sustainable analytic of system of systems with long life time. In: 2021 16th International Conference of System of Systems Engineering (SoSE), pp. 69–74 (2021). https://doi.org/10.1109/SOSE52739.2021.9497465
Han, Q., Zhang, J., Ding, H., Sun, J., Zhang, H., Yuan, D.: Cloud-edge collaborative-based digital twin system for hardware limited IIoT scenario. In: 2023 IEEE Smart World Congress (SWC), pp. 1–8 (2023). https://doi.org/10.1109/SWC57546.2023.10448579
Holmes, D., Papathanasaki, M., Maglaras, L., Ferrag, M.A., Nepal, S., Janicke, H.: Digital twins and cyber security - solution or challenge? In: 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), pp. 1–8 (2021). https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566277
Itäpelto, T.: Digital twin enhanced critical infrastructure life cycle security. In: 2023 IEEE Smart World Congress (SWC), pp. 1–3 (2023). https://doi.org/10.1109/SWC57546.2023.10448804
Jia, Y., Gu, Z., Li, A., Han, W.: Introduction to the MDATA model. In: Jia, Y., Gu, Z., Li, A. (eds.) MDATA: A New Knowledge Representation Model: Theory, Methods and Applications, pp. 1–18. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-71590-8_1
Kritzinger, W., Karner, M., Traar, G., Henjes, J., Sihn, W.: Digital twin in manufacturing: a categorical literature review and classification. IFAC-PapersOnLine 51(11), 1016–1022 (2018). https://doi.org/10.1016/j.ifacol.2018.08.474
Lampropoulos, G., Siakas, K.: Enhancing and securing cyber-physical systems and industry 4.0 through digital twins: a critical review. J. Softw. Evol. Process 35(7), e2494 (2023). https://doi.org/10.1002/smr.2494
Lankhorst, M.: Introduction to Enterprise Architecture, pp. 1–11. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01310-2_1
Masi, M., Sellitto, G.P., Aranha, H., Pavleska, T.: Securing critical infrastructures with a cybersecurity digital twin. Softw. Syst. Model. 22(2), 689-707 (2023). https://doi.org/10.1007/s10270-022-01075-0
Mayer, N., Feltus, C.: Evaluation of the risk and security overlay of archimate to model information system security risks. In: 2017 IEEE 21st International Enterprise Distributed Object Computing Workshop (EDOCW), pp. 106–116 (2017). https://doi.org/10.1109/EDOCW.2017.30
Noor, M.M., Selamat, A., Husain, N.A., Krejcar, O.: Security and safety in cyber-physical system (CPS): an inclusive threat model. J. Adv. Res. Appl. Sci. Eng. Technol. 40(2), 176–202 (2024). https://doi.org/10.37934/araset.40.2.176202
Patzer, F., Meshram, A., Birnstill, P., Haas, C., Beyerer, J.: Towards computer-aided security life cycle management for critical industrial control systems. In: Luiijf, E., Žutautaitė, I., Hämmerli, B.M. (eds.) Critical Information Infrastructures Security, pp. 45–56. Springer, Cham (2019)
Pawlicka, A., Puchalski, D., Pawlicki, M., Kozik, R., Choraś, M.: How to secure the IoT-based surveillance systems in an elegant way. In: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 636–640 (2023). https://doi.org/10.1109/CSR57506.2023.10224938
Sellitto, G.P., Masi, M., Pavleska, T., Aranha, H.: A cyber security digital twin for critical infrastructure protection: the intelligent transport system use case. In: Serral, E., Stirna, J., Ralyté, J., Grabis, J. (eds.) The Practice of Enterprise Modeling, pp. 230–244. Lecture Notes in Business Information Processing. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-91279-6_16
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Itäpelto, T., Elhajj, M., van Sinderen, M., Iacob, M. (2025). Reference Architecture of Cybersecurity Digital Twin. In: Kaczmarek-Heß, M., Rosenthal, K., Suchánek, M., Da Silva, M.M., Proper, H.A., Schnellmann, M. (eds) Enterprise Design, Operations, and Computing. EDOC 2024 Workshops . EDOC 2024. Lecture Notes in Business Information Processing, vol 537. Springer, Cham. https://doi.org/10.1007/978-3-031-79059-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-031-79059-1_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-79058-4
Online ISBN: 978-3-031-79059-1
eBook Packages: Computer ScienceComputer Science (R0)