Digital twin-based method for detecting information security threats in critical information infrastructure objects

Cover Page

Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription or Fee Access

Abstract

The article presents a method for detecting information security (IS) threat indicators in critical information infrastructure (CII) facilities using a digital twin (DT) with an adaptive mechanism. It addresses the limitations of traditional IS approaches under conditions of scarce real attack data, challenges in testing on operational CII facilities, and difficulties in identifying targeted, evasive threats. A dual-loop method (DT loop and CII facility loop) integrated with a three-level adaptation mechanism (operational, tactical, strategic modes) is proposed. The method encompasses stages of synthetic data generation, model training/testing in the DT, detection/classification at the facility, and defines adaptation trigger. Key advantages include the ability to safely generate threat scenarios and train in the virtual DT environment, automated maintenance of threat detection models. Validation results on a synthetic model of energy facility control system show significant improvement in quality metrics after adaptation.

Full Text

Restricted Access

About the authors

Evgenii S. Mityakov

MIREA – Russian Technological University

Author for correspondence.
Email: mityakov@mirea.ru
ORCID iD: 0000-0001-6579-0988
SPIN-code: 5691-8947

Dr. Sci. (Econ.), Professor, head, KB-9 Department

Russian Federation, Moscow

References

  1. Bozdal M. Security through digital twin-based intrusion detection: A SWaT dataset analysis. In: 16th International Conference on Information Security and Cryptology (ISCTürkiye). 2023. Pp. 1–6. doi: 10.1109/ISCTrkiye61151.2023.10336137.
  2. De Hoz Diego J., Temperekidis A., Katsaros P., Konstantinou C. An IoT digital twin for cyber-security defence based on runtime verification. LNCS. 2022. Pp. 556–574. doi: 10.1007/978-3-031-19849-6_31.
  3. Krishnaveni S., Chen T., Sathiyanarayanan M., Amutha B. CyberDefender: An integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems. Cluster Computing. 2024. Vol. 27. Pp. 7273–7306. doi: 10.1007/s10586-024-04320-x.
  4. Lv H.B., Chen D.L., Cao B. et al. Secure deep learning in defense in deep-learning-as-a-service computing systems in digital twins. IEEE Transactions on Computers. 2024. Vol. 73. No. 3. Pp. 656–668. doi: 10.1109/TC.2021.3077687.
  5. Ma J., Guo Y., Fang Ch., Zhang Qi. Digital-twin-based cps anomaly diagnosis and security defense countermeasure recommendation. IEEE Internet of Things Journal. 2024. Vol. 11. Pp. 18726–18738. doi: 10.1109/JIOT.2024.3366904.
  6. Masi M., Sellitto G., Aranha H., Pavleska T. Securing critical infrastructures with a cybersecurity digital twin. Software and Systems Modeling. 2023. Vol. 22. Pp. 689–707. doi: 10.1007/s10270-022-01075-0.
  7. Patel T., Jadav N., Rathod T. et al. AI-based secure intrusion detection framework for digital twin-enabled critical infrastructure. In: 14th International Conference on Information and Knowledge Technology (IKT). 2023. Pp. 24–29. doi: 10.1109/IKT62039.2023.10433057.
  8. Salim M., Camacho D., Park J. Digital Twin and federated learning enabled cyberthreat detection system for IoT networks. Future Generation Computer Systems. 2024. Vol. 161. Pp. 701–713. doi: 10.1016/j.future.2024.07.017.
  9. Sousa B., Arieiro M., Pereira V. et al. ELEGANT: Security of critical infrastructures with digital twins. IEEE Access. 2021. Vol. 9. Pp. 107574–107588. doi: 10.1109/ACCESS.2021.3100708.
  10. Bayanova Yu.A. Critical information infrastructure as an object of security. Innovatsionnaya nauka. 2021. No. 10-2. Pp. 63–65. (In Rus.)
  11. Kochergin S.V., Artemova S.V., Bakaev A.A. et al. Anomaly detection in power systems: Application of the Isolation Forest model for identifying cyber threats. Information Technology Security. 2025. Vol. 32. No. 1. Pp. 112–121. (In Rus.). doi: 10.26583/bit.2025.1.07.
  12. Kochergin S.V., Artemova S.V., Bakaev A.A. et al. Enhancing smart grid security: Spectral and fractal analysis as tools for cyberattack detection. Russian Technological Journal. 2025. Vol. 13. No. 1. Pp. 7–15. (In Rus.). doi: 10.32362/2500-316X-2025-13-1-7-15.
  13. Mityakov E.S. Problems of using digital twins in information security of critical information infrastructure facilities. Information Technologies and Telecommunications. 2023. Vol. 11. No. 4. Pp. 36–47. (In Rus.). doi: 10.31854/2307-1303-2023-11-4-36-47.
  14. Mityakov E.S. Digital twins and critical information infrastructure security: Legal and technological aspects. National Security and Strategic Planning. 2024. No. 4 (48). Pp. 29–34. (In Rus.). doi: 10.37468/2307-1400-2024-4-29-34.
  15. Saukh I.A. Objects of critical information infrastructure under information attacks. Innovations. Science. Education. 2022. No. 49. Pp. 1302–1306. (In Rus.)

Supplementary files

Supplementary Files
Action
1. JATS XML
2. Fig. 1. Method diagram

Download (1MB)
3. Fig. 2. The closed adaptation cycle

Download (199KB)
4. Fig. 3. An example of a voltage time series with annotated anomalies

Download (311KB)

Copyright (c) 2025 Yur-VAK

License URL: https://www.urvak.ru/contacts/