Digital twin-based method for detecting information security threats in critical information infrastructure objects
- Авторлар: Mityakov E.S.1
 - 
							Мекемелер: 
							
- MIREA – Russian Technological University
 
 - Шығарылым: Том 12, № 3 (2025)
 - Беттер: 115-122
 - Бөлім: METHODS AND SYSTEMS OF INFORMATION PROTECTION, INFORMATION SECURITY
 - URL: https://journals.eco-vector.com/2313-223X/article/view/695737
 - DOI: https://doi.org/10.33693/2313-223X-2025-12-3-115-122
 - EDN: https://elibrary.ru/BGUXHV
 - ID: 695737
 
Дәйексөз келтіру
Аннотация
The article presents a method for detecting information security (IS) threat indicators in critical information infrastructure (CII) facilities using a digital twin (DT) with an adaptive mechanism. It addresses the limitations of traditional IS approaches under conditions of scarce real attack data, challenges in testing on operational CII facilities, and difficulties in identifying targeted, evasive threats. A dual-loop method (DT loop and CII facility loop) integrated with a three-level adaptation mechanism (operational, tactical, strategic modes) is proposed. The method encompasses stages of synthetic data generation, model training/testing in the DT, detection/classification at the facility, and defines adaptation trigger. Key advantages include the ability to safely generate threat scenarios and train in the virtual DT environment, automated maintenance of threat detection models. Validation results on a synthetic model of energy facility control system show significant improvement in quality metrics after adaptation.
Толық мәтін
Авторлар туралы
Evgenii Mityakov
MIREA – Russian Technological University
							Хат алмасуға жауапты Автор.
							Email: mityakov@mirea.ru
				                	ORCID iD: 0000-0001-6579-0988
				                	SPIN-код: 5691-8947
																		                								
Dr. Sci. (Econ.), Professor, head, KB-9 Department
Ресей, MoscowӘдебиет тізімі
- Bozdal M. Security through digital twin-based intrusion detection: A SWaT dataset analysis. In: 16th International Conference on Information Security and Cryptology (ISCTürkiye). 2023. Pp. 1–6. doi: 10.1109/ISCTrkiye61151.2023.10336137.
 - De Hoz Diego J., Temperekidis A., Katsaros P., Konstantinou C. An IoT digital twin for cyber-security defence based on runtime verification. LNCS. 2022. Pp. 556–574. doi: 10.1007/978-3-031-19849-6_31.
 - Krishnaveni S., Chen T., Sathiyanarayanan M., Amutha B. CyberDefender: An integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems. Cluster Computing. 2024. Vol. 27. Pp. 7273–7306. doi: 10.1007/s10586-024-04320-x.
 - Lv H.B., Chen D.L., Cao B. et al. Secure deep learning in defense in deep-learning-as-a-service computing systems in digital twins. IEEE Transactions on Computers. 2024. Vol. 73. No. 3. Pp. 656–668. doi: 10.1109/TC.2021.3077687.
 - Ma J., Guo Y., Fang Ch., Zhang Qi. Digital-twin-based cps anomaly diagnosis and security defense countermeasure recommendation. IEEE Internet of Things Journal. 2024. Vol. 11. Pp. 18726–18738. doi: 10.1109/JIOT.2024.3366904.
 - Masi M., Sellitto G., Aranha H., Pavleska T. Securing critical infrastructures with a cybersecurity digital twin. Software and Systems Modeling. 2023. Vol. 22. Pp. 689–707. doi: 10.1007/s10270-022-01075-0.
 - Patel T., Jadav N., Rathod T. et al. AI-based secure intrusion detection framework for digital twin-enabled critical infrastructure. In: 14th International Conference on Information and Knowledge Technology (IKT). 2023. Pp. 24–29. doi: 10.1109/IKT62039.2023.10433057.
 - Salim M., Camacho D., Park J. Digital Twin and federated learning enabled cyberthreat detection system for IoT networks. Future Generation Computer Systems. 2024. Vol. 161. Pp. 701–713. doi: 10.1016/j.future.2024.07.017.
 - Sousa B., Arieiro M., Pereira V. et al. ELEGANT: Security of critical infrastructures with digital twins. IEEE Access. 2021. Vol. 9. Pp. 107574–107588. doi: 10.1109/ACCESS.2021.3100708.
 - Bayanova Yu.A. Critical information infrastructure as an object of security. Innovatsionnaya nauka. 2021. No. 10-2. Pp. 63–65. (In Rus.)
 - Kochergin S.V., Artemova S.V., Bakaev A.A. et al. Anomaly detection in power systems: Application of the Isolation Forest model for identifying cyber threats. Information Technology Security. 2025. Vol. 32. No. 1. Pp. 112–121. (In Rus.). doi: 10.26583/bit.2025.1.07.
 - Kochergin S.V., Artemova S.V., Bakaev A.A. et al. Enhancing smart grid security: Spectral and fractal analysis as tools for cyberattack detection. Russian Technological Journal. 2025. Vol. 13. No. 1. Pp. 7–15. (In Rus.). doi: 10.32362/2500-316X-2025-13-1-7-15.
 - Mityakov E.S. Problems of using digital twins in information security of critical information infrastructure facilities. Information Technologies and Telecommunications. 2023. Vol. 11. No. 4. Pp. 36–47. (In Rus.). doi: 10.31854/2307-1303-2023-11-4-36-47.
 - Mityakov E.S. Digital twins and critical information infrastructure security: Legal and technological aspects. National Security and Strategic Planning. 2024. No. 4 (48). Pp. 29–34. (In Rus.). doi: 10.37468/2307-1400-2024-4-29-34.
 - Saukh I.A. Objects of critical information infrastructure under information attacks. Innovations. Science. Education. 2022. No. 49. Pp. 1302–1306. (In Rus.)
 
				
			
						
						
						
						
					




