Skip to main content

Reference Architecture of Cybersecurity Digital Twin

  • Conference paper
  • First Online:
Enterprise Design, Operations, and Computing. EDOC 2024 Workshops (EDOC 2024)

Abstract

The transformation of previously isolated Critical Infrastructures (CIs) into intricate Systems-of-Systems has rendered them vulnerable to various threats. CIs are characterized by long life cycles and high availability requirements, which pose significant challenges in maintaining cybersecurity throughout their operational life cycle. Existing testing methodologies prove inadequate and may compromise the CI’s operational continuity. This paper proposes to shift testing activities to a Digital Twin (DT) connected to the CI. The DT provides a digital counterpart of the real system, enabling cost-effective testing without compromising operational integrity. For this approach, we present an enterprise architecture called the cybersecurity DT reference architecture. Through a camera surveillance system use case, we demonstrate the feasibility of this reference architecture, focusing on what-if testing using DT-enabled attack simulations. We show how to enhance decision-making when evaluating system configurations and how to deploy optimized configurations to the real system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.opengroup.org/archimate-forum/archimate-overview.

  2. 2.

    High-resolution images of the models available in: https://gitlab.utwente.nl/itapelto/whattwin.

  3. 3.

    https://attack.mitre.org/resources/working-with-attack/.

  4. 4.

    https://cve.mitre.org/.

References

  1. CISA Cybersecurity & Infrastructure Security Agency: Critical infrastructure sectors. https://www.cisa.gov/critical-infrastructure-sectors. Accessed 08 Aug 2024

  2. De Benedictis, A., Esposito, C., Somma, A.: Toward the adoption of secure cyber digital twins to enhance cyber-physical systems security. In: Vallecillo, A., Visser, J., Pérez-Castillo, R. (eds.) Quality of Information and Communications Technology, pp. 307–321. Springer, Cham (2022)

    Chapter  MATH  Google Scholar 

  3. Dietz, M., Hageman, L., von Hornung, C., Pernul, G.: Employing digital twins for security-by-design system testing. In: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, pp. 97–106. Sat-CPS 2022. Association for Computing Machinery, New York (2022)

    Google Scholar 

  4. Hallmans, D., Sandström, K., Larsson, S., Nolte, T.: Challenges in providing sustainable analytic of system of systems with long life time. In: 2021 16th International Conference of System of Systems Engineering (SoSE), pp. 69–74 (2021). https://doi.org/10.1109/SOSE52739.2021.9497465

  5. Han, Q., Zhang, J., Ding, H., Sun, J., Zhang, H., Yuan, D.: Cloud-edge collaborative-based digital twin system for hardware limited IIoT scenario. In: 2023 IEEE Smart World Congress (SWC), pp. 1–8 (2023). https://doi.org/10.1109/SWC57546.2023.10448579

  6. Holmes, D., Papathanasaki, M., Maglaras, L., Ferrag, M.A., Nepal, S., Janicke, H.: Digital twins and cyber security - solution or challenge? In: 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), pp. 1–8 (2021). https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566277

  7. Itäpelto, T.: Digital twin enhanced critical infrastructure life cycle security. In: 2023 IEEE Smart World Congress (SWC), pp. 1–3 (2023). https://doi.org/10.1109/SWC57546.2023.10448804

  8. Jia, Y., Gu, Z., Li, A., Han, W.: Introduction to the MDATA model. In: Jia, Y., Gu, Z., Li, A. (eds.) MDATA: A New Knowledge Representation Model: Theory, Methods and Applications, pp. 1–18. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-71590-8_1

  9. Kritzinger, W., Karner, M., Traar, G., Henjes, J., Sihn, W.: Digital twin in manufacturing: a categorical literature review and classification. IFAC-PapersOnLine 51(11), 1016–1022 (2018). https://doi.org/10.1016/j.ifacol.2018.08.474

    Article  Google Scholar 

  10. Lampropoulos, G., Siakas, K.: Enhancing and securing cyber-physical systems and industry 4.0 through digital twins: a critical review. J. Softw. Evol. Process 35(7), e2494 (2023). https://doi.org/10.1002/smr.2494

  11. Lankhorst, M.: Introduction to Enterprise Architecture, pp. 1–11. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01310-2_1

  12. Masi, M., Sellitto, G.P., Aranha, H., Pavleska, T.: Securing critical infrastructures with a cybersecurity digital twin. Softw. Syst. Model. 22(2), 689-707 (2023). https://doi.org/10.1007/s10270-022-01075-0

  13. Mayer, N., Feltus, C.: Evaluation of the risk and security overlay of archimate to model information system security risks. In: 2017 IEEE 21st International Enterprise Distributed Object Computing Workshop (EDOCW), pp. 106–116 (2017). https://doi.org/10.1109/EDOCW.2017.30

  14. Noor, M.M., Selamat, A., Husain, N.A., Krejcar, O.: Security and safety in cyber-physical system (CPS): an inclusive threat model. J. Adv. Res. Appl. Sci. Eng. Technol. 40(2), 176–202 (2024). https://doi.org/10.37934/araset.40.2.176202

  15. Patzer, F., Meshram, A., Birnstill, P., Haas, C., Beyerer, J.: Towards computer-aided security life cycle management for critical industrial control systems. In: Luiijf, E., Žutautaitė, I., Hämmerli, B.M. (eds.) Critical Information Infrastructures Security, pp. 45–56. Springer, Cham (2019)

    Chapter  Google Scholar 

  16. Pawlicka, A., Puchalski, D., Pawlicki, M., Kozik, R., Choraś, M.: How to secure the IoT-based surveillance systems in an elegant way. In: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 636–640 (2023). https://doi.org/10.1109/CSR57506.2023.10224938

  17. Sellitto, G.P., Masi, M., Pavleska, T., Aranha, H.: A cyber security digital twin for critical infrastructure protection: the intelligent transport system use case. In: Serral, E., Stirna, J., Ralyté, J., Grabis, J. (eds.) The Practice of Enterprise Modeling, pp. 230–244. Lecture Notes in Business Information Processing. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-91279-6_16

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taru Itäpelto .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Itäpelto, T., Elhajj, M., van Sinderen, M., Iacob, M. (2025). Reference Architecture of Cybersecurity Digital Twin. In: Kaczmarek-Heß, M., Rosenthal, K., Suchánek, M., Da Silva, M.M., Proper, H.A., Schnellmann, M. (eds) Enterprise Design, Operations, and Computing. EDOC 2024 Workshops . EDOC 2024. Lecture Notes in Business Information Processing, vol 537. Springer, Cham. https://doi.org/10.1007/978-3-031-79059-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-79059-1_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-79058-4

  • Online ISBN: 978-3-031-79059-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics