ISCAP Proceedings: Abstract Presentation
Leveraging Dual Digital Twins for Advanced Cybersecurity Measures
Chase Peterson
Metropolitan State University Minnesota
Abstract
The exponential growth of the internet has also been the growth of vulnerabilities and attack surfaces (CSIS, 2024). The world economic forum estimated the cost of cybercrime in 2023 was 11.5 trillion USD and forecast it to grow to 23.82 trillion by 2027(Charlton, 2024). This poses a significant problem for organizations around the world, in a recent survey conducted by Cisco (2024) about 54% of companies reported being the target of a successful attack, a little more than half (52%) of the compromised companies reported that the incident cost the company at least $300,000 USD, with 12% saying that their impact was over a million USD. 73% of companies believe that within the next 24 months they will suffer a significant disruption due to a cyberattack (Cisco, 2024). The threat of a costly attack prompts companies to ask themselves how they can predict future attacks and minimize their impact. Current techniques for forecasting cyber defense are more reactive than proactive, and research into using Machine Learning has demonstrated that while it is able to forecast with roughly 70% accuracy at best. An answer may lie in a set of Digital Twins emulating the attack and defense of the company.
In 2003, Grieves learned of the idea of a Digital Twin (DT) from NASA’s John Vickers and later used it in his University of Michigan Executive Course on Product Lifecycle Management, in it he defined the potential to simulate the manufacturing process as well as optimize the product life (Grieves, 2014). He discussed that a DT is composed of three key parts; physical products in physical space, virtual products in virtual space and a data link between the two. Building on that work and expanding the concept of a DT into a cyber focused equivalent, Luzzi et al (2024) conducted a systematic literature review that identifies most of the existing literature focused on a Cyber-Cyber System (CCS), as opposed to a Cyber-Physical System (CPS). They also discuss the current prevailing strategies for predicting cyberattacks; what the current uses of DTs (Digital Twin) in the field of cybersecurity are; and what role DTs can play in enhancing the prediction of an attack. Additionally, they highlight three advantages of the CCS over a CPS; complete malleability meaning that any changes made to the DT can be implemented, true-twins showcase the blending and seamless transition between real and simulated and a simulation hierarchy meaning that a DT can replicate itself for further testing. The use of machine learning for a proactive approach to forecasting cyber threats has been explored by Almahmoud et al. and discuss the benefits of a forward-thinking approach as opposed to a traditional reactive approach (2023). They offer both a novel dataset constructed of big unstructured data and outline how their approach can predict threat trends up to three years in advance with up to 70% accuracy across a wide range of attacks including univariate and multivariate analysis for 42 different cyber-attacks. This offers an attractive benchmark that can be used to validate future DT testing and applications.
The research regarding DTs and their application in a CCS is sparse compared to research with a more AI and ML (Machine Learning) centric view, however Dietz et al.(2022) demonstrate the ability of DT to engage in security by design system testing and show how DTs can be used in an industrial control system to prevent a pressure tank from exploding. Somma et al. (2020) introduce a potential framework for their DT implementation in cybersecurity utilizing five layers consisting of the Physical Twin(PT) layer representing the CPS, the PT-DT layer manages the data generated from the PT, the DT layer that replicates the network using Mininet, specifically MiniCPS(Antonioli and Tippenhauer, 2017), the DT-Serv layer which manages the data generated by the DT and last the Service layer where different security services are hosted. Suhail et al. (2023) highlights the potential threats that a DT may pose due to their interconnected nature with the CPS and propose a method of gamification that aims to secure the CPS through the use of AI/ML adversarial testing showing how their framework can be utilized to strengthen and introduce an explainable element for validation and verification. Hadar et al. (2020) show that DTs can be used to analyze and gather requirements for necessary security controls as well as to optimize and identify current or missing controls, outlining how DTs can be utilized within the design process to identify and rectify missing security controls. Current literature identifies the threat actor and defensive component of a given CCS DT as being one system and interacting as one system (Hader et al, 2020; Somma et al, 2020; Suhail et al, 2023, Luzzi et al, 2024).
We propose that the separation of these two aspects, attack and defense, will allow for a greater degree of fidelity by allowing for greater control of the data incorporated into each twin. Somma et al, (2020) outline their five layers to implementing a proof of concept DT in a simulated network, representing the different devices in the network and by utilizing the forecasting benchmark and dataset outlined by Almahmoud et al, (2023) we can establish a baseline for future twin sets to be measured against for efficacy.