| Angenommene Version Download ( PDF | 777kB) Nur für Mitarbeiter des Archivs |
Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence
Dietz, Marietheres
, Schlette, Daniel
und Pernul, Günther
(2022)
Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence.
In: The 46th IEEE Computer Society Signature Conference on Computers, Software, and Applications (COMPSAC 2022), June 27 - July 1 2022, Virtual Only.
Veröffentlichungsdatum dieses Volltextes: 26 Jul 2022 07:58
Konferenz- oder Workshop-Beitrag
DOI zum Zitieren dieses Dokuments: 10.5283/epub.52629
Zusammenfassung
Understanding cybersecurity threats, attacks, and incidents is crucial for organizations to perform preventive or reactive measures. Nevertheless, detailed Cyber Threat Intelligence (CTI) is reluctantly shared. Digital twins, the virtual counterparts of real-world assets, offer security simulation capabilities. The simulation of attack scenarios on industrial control systems (ICS) with digital ...
Understanding cybersecurity threats, attacks, and incidents is crucial for organizations to perform preventive or reactive measures. Nevertheless, detailed Cyber Threat Intelligence (CTI) is reluctantly shared. Digital twins, the virtual counterparts of real-world assets, offer security simulation capabilities. The simulation of attack scenarios on industrial control systems (ICS) with digital twins yields valuable threat information. In our work, we outline the systematic steps towards a structured threat report starting with digital twin security simulations: We first present the course of action and define formal requirements for framework deployment. We then conduct an attack simulation with a prototypical digital twin application to evaluate our framework. Using the STIX2.1 standard, we assist CTI generation by providing utility tools guiding through the process steps. Our experimental results show that a STIX2.1 CTI report can be systematically constructed with the opportunity to customize according to the use case at hand. Adding digital twin security simulations to the list of CTI sources can provide shareable CTI and help organizations improve their security posture.
Alternative Links zum Volltext
Beteiligte Einrichtungen
Details
| Dokumentenart | Konferenz- oder Workshop-Beitrag (Paper) | ||||
| Seitenbereich: | S. 789-797 | ||||
|---|---|---|---|---|---|
| Datum | Juli 2022 | ||||
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) | ||||
| Identifikationsnummer |
| ||||
| Stichwörter / Keywords | digital twin, cyber threat intelligence, simulation, security analysis | ||||
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik 300 Sozialwissenschaften > 330 Wirtschaft | ||||
| Status | Veröffentlicht | ||||
| Begutachtet | Ja, diese Version wurde begutachtet | ||||
| An der Universität Regensburg entstanden | Ja | ||||
| Dokumenten-ID | 52629 |
Downloadstatistik
Downloadstatistik