Direkt zum Inhalt

Dietz, Marietheres ; Schlette, Daniel ; Pernul, Günther

Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence

Dietz, Marietheres , Schlette, Daniel und Pernul, Günther (2022) Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence. In: The 46th IEEE Computer Society Signature Conference on Computers, Software, and Applications (COMPSAC 2022), June 27 - July 1 2022, Virtual Only.

Veröffentlichungsdatum dieses Volltextes: 26 Jul 2022 07:58
Konferenz- oder Workshop-Beitrag
DOI zum Zitieren dieses Dokuments: 10.5283/epub.52629


Zusammenfassung

Understanding cybersecurity threats, attacks, and incidents is crucial for organizations to perform preventive or reactive measures. Nevertheless, detailed Cyber Threat Intelligence (CTI) is reluctantly shared. Digital twins, the virtual counterparts of real-world assets, offer security simulation capabilities. The simulation of attack scenarios on industrial control systems (ICS) with digital ...

Understanding cybersecurity threats, attacks, and incidents is crucial for organizations to perform preventive or reactive measures. Nevertheless, detailed Cyber Threat Intelligence (CTI) is reluctantly shared. Digital twins, the virtual counterparts of real-world assets, offer security simulation capabilities. The simulation of attack scenarios on industrial control systems (ICS) with digital twins yields valuable threat information. In our work, we outline the systematic steps towards a structured threat report starting with digital twin security simulations: We first present the course of action and define formal requirements for framework deployment. We then conduct an attack simulation with a prototypical digital twin application to evaluate our framework. Using the STIX2.1 standard, we assist CTI generation by providing utility tools guiding through the process steps. Our experimental results show that a STIX2.1 CTI report can be systematically constructed with the opportunity to customize according to the use case at hand. Adding digital twin security simulations to the list of CTI sources can provide shareable CTI and help organizations improve their security posture.



Beteiligte Einrichtungen


Details

DokumentenartKonferenz- oder Workshop-Beitrag (Paper)
Seitenbereich:S. 789-797
DatumJuli 2022
InstitutionenWirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul)
Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul)
Identifikationsnummer
WertTyp
10.1109/COMPSAC54236.2022.00129DOI
Stichwörter / Keywordsdigital twin, cyber threat intelligence, simulation, security analysis
Dewey-Dezimal-Klassifikation000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik
300 Sozialwissenschaften > 330 Wirtschaft
StatusVeröffentlicht
BegutachtetJa, diese Version wurde begutachtet
An der Universität Regensburg entstandenJa
Dokumenten-ID52629

Bibliographische Daten exportieren

Nur für Besitzer und Autoren: Kontrollseite des Eintrags

nach oben