skip to main content
10.1145/3600160.3600195acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article
Open Access

Digital Twin-Enhanced Incident Response for Cyber-Physical Systems

Published:29 August 2023Publication History

ABSTRACT

Cyber-physical systems underpin many of our society’s critical infrastructures. Ensuring their cyber security is important and complex. A major activity in this regard is cyber security incident response, whose primary goal is to detect and mitigate cyber-attacks in order to ensure the continuity and resilience of services. For cyber-physical systems this is particularly challenging because it requires insights both from the cyber and physical (process) domains and the engagement of stakeholders that are not strictly concerned with cyber security. A technology that is receiving a lot of attention are digital twins – virtual representations of real-world (cyber-physical) systems. They can be used to support tasks such as estimating the state of a system and exploring the consequences of interventional activities (e.g., upgrades).

In this paper, we examine the use of digital twins to support cyber security. Specifically, our novel contribution is to provide a comprehensive analysis of the types of activities and how different modalities of digital twin use can be applied to the phases of cyber security incident response. Building on this analysis, we propose a structured approach to enhancing cyber security playbooks for cyber-physical systems incident response with digital twins. Playbooks are an essential component of incident response, ensuring that multi-disciplinary teams are effective in responding to cyber security incidents; therefore, improvements in their execution can result in increased resilience. To illustrate our approach, we present its use for a playbook that is concerned with mitigating a cyber-attack to critical industrial equipment.

References

  1. David Allison, Paul Smith, and Kieran McLaughlin. 2022. Digital Twin-Enhanced Methodology for Training Edge-Based Models for Cyber Security Applications. In 2022 IEEE 20th International Conference on Industrial Informatics (INDIN). IEEE, Perth, Australia.Google ScholarGoogle Scholar
  2. Manolya Atalay and Pelin Angin. 2020. A Digital Twins Approach to Smart Grid Security Testing and Standardization. In 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT. 435–440. https://doi.org/10.1109/MetroInd4.0IoT48571.2020.9138264Google ScholarGoogle ScholarCross RefCross Ref
  3. E. Biham, S. Bitan, Aviad Carmel, Alon Dankner, Uriel Malin, and A. Wool. 2019. Rogue 7 : Rogue Engineering-Station Attacks on S 7 Simatic PLCs.Google ScholarGoogle Scholar
  4. Adrien Bécue, Eva Maia, Linda Feeken, Philipp Borchers, and Isabel Praça. 2020. A New Concept of Digital Twin Supporting Optimization and Resilience of Factories of the Future. Applied Sciences 10, 13 (Jan. 2020), 4482. https://doi.org/10.3390/app10134482 Number: 13 Publisher: Multidisciplinary Digital Publishing Institute.Google ScholarGoogle ScholarCross RefCross Ref
  5. Paul Cichonski, Tom Millar, Tim Grance, and Karen Scarfone. 2012. Computer Security Incident Handling Guide : Recommendations of the National Institute of Standards and Technology. Technical Report. National Institute of Standards and Technology. NIST SP 800–61r2 pages. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdfDOI: 10.6028/NIST.SP.800-61r2.Google ScholarGoogle Scholar
  6. Incident Response Consortium. 2023. Incident Response Playbooks Gallery. https://www.incidentresponse.org/playbooks/Google ScholarGoogle Scholar
  7. Cybersecurity and Infrastructure Security Agency (CISA). 2022. Operational Procedures for Planning and Conducting Cybersecurity Incident and Vulnerability Response Activities in FCEB Information Systems. Technical Report. Cybersecurity and Infrastructure Security Agency (CISA), Arlington, VA. https://www.cisa.gov/uscert/sites/default/files/publications/federal-government-cybersecurity-incident-and-vulnerability-response-playbooks-508c.pdfGoogle ScholarGoogle Scholar
  8. Marietheres Dietz, Ludwig Englbrecht, and Günther Pernul. 2021. Enhancing Industrial Control System Forensics using Replication Based Digital Twins. In Advances in Digital Forensics XVII, Gilbert Peterson and Sujeet Shenoi (Eds.). Springer International Publishing, Cham, 21–38.Google ScholarGoogle Scholar
  9. Marietheres Dietz and Gunther Pernul. 2020. Unleashing the Digital Twin’s Potential for ICS Security. IEEE Security Privacy 18, 4 (July 2020), 20–27. https://doi.org/10.1109/MSEC.2019.2961650Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Marietheres Dietz, Benedikt Putz, and Günther Pernul. 2019. A Distributed Ledger Approach to Digital Twin Secure Data Sharing. In Data and Applications Security and Privacy XXXIII(Lecture Notes in Computer Science), Simon N. Foley (Ed.). Springer International Publishing, Cham, 281–300. https://doi.org/10.1007/978-3-030-22479-0_15Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Marietheres Dietz, Manfred Vielberth, and Günther Pernul. 2020. Integrating digital twin security simulations in the security operations center. In Proceedings of the 15th International Conference on Availability, Reliability and Security(ARES ’20). Association for Computing Machinery, New York, NY, USA, 1–9. https://doi.org/10.1145/3407023.3407039Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Matthias Eckhart and Andreas Ekelhart. 2018. A Specification-Based State Replication Approach for Digital Twins. In Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy - CPS-SPC ’18. ACM Press, Toronto, Canada, 36–47. https://doi.org/10.1145/3264888.3264892Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Matthias Eckhart and Andreas Ekelhart. 2018. Towards Security-Aware Virtual Environments for Digital Twins. In Proceedings of the 4th ACM Workshop on Cyber-Physical System Security - CPSS ’18. ACM Press, Incheon, Republic of Korea, 61–72. https://doi.org/10.1145/3198458.3198464Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Matthias Eckhart and Andreas Ekelhart. 2019. Digital Twins for Cyber-Physical Systems Security: State of the Art and Outlook. In Security and Quality in Cyber-Physical Systems Engineering. Springer, 383–412. https://doi.org/10.1007/978-3-030-25312-7_14Google ScholarGoogle ScholarCross RefCross Ref
  15. Matthias Eckhart, Andreas Ekelhart, and Edgar Weippl. 2019. Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins. In 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 1222–1225. https://doi.org/10.1109/ETFA.2019.8869197Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Philip Empl, Daniel Schlette, Daniel Zupfer, and Günther Pernul. 2022. SOAR4IoT: Securing IoT Assets with Digital Twins. In Proceedings of the 17th International Conference on Availability, Reliability and Security. ACM, Vienna Austria. https://doi.org/10.1145/3538969.3538975Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Integrated Adaptive Cyber Defense (IACD). 2017. A Specification for Defining, Building and Employing Playbooks to Enable Cybersecurity Integration and Automation. https://tinyurl.com/IACDSpecGoogle ScholarGoogle Scholar
  18. International Atomic Energy Agency. 1985. IAEA-TECDOC-341 - Developments in the Preparation of Operating Procedures for Emergency Conditions of Nuclear Power Plants. Technical Report. International Atomic Energy Agency, Vienna, Austria.Google ScholarGoogle Scholar
  19. International Atomic Energy Agency. 2006. Development and Review of Plant Specific Emergency Operating Procedures. Technical Report 48. International Atomic Energy Agency, Vienna, Austria. 103 pages.Google ScholarGoogle Scholar
  20. International Atomic Energy Agency. 2016. Computer Security Incident Response Planning at Nuclear Facilities. Technical Report IAEA-TDL-005. International Atomic Energy Agency, Vienna, Austria. https://www-pub.iaea.org/MTCD/publications/PDF/TDL005web.pdfGoogle ScholarGoogle Scholar
  21. Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, and Christopher Glyer. 2017. Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure. https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html [Online; accessed 2018-05-25].Google ScholarGoogle Scholar
  22. Patrick Kral. 2021. The Incident Handler’s Handbook. Technical Report. Escal Institute of Advanced Technologies (SANS Institute), Rockville, Maryland, United States.Google ScholarGoogle Scholar
  23. Robert Lee, Michael Assante, and Tim Conway. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid. Technical Report. Electricity Information Sharing and Analysis Center (E-ISAC), Washington D.C., USA. https://nsarchive.gwu.edu/sites/default/files/documents/3891751/SANS-and-Electricity-Information-Sharing-and.pdfGoogle ScholarGoogle Scholar
  24. Microsoft Corporation. 2022. Microsoft Incident Response Playbooks. https://learn.microsoft.com/en-us/security/compass/incident-response-playbooksGoogle ScholarGoogle Scholar
  25. Judea Pearl. 2019. The Seven Tools of Causal Inference, with Reflections on Machine Learning. Commun. ACM 62, 3 (Feb. 2019), 54–60. https://doi.org/10.1145/3241036Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Paula Savioja, Leena Norros, Leena Salo, and Iina Aaltonen. 2014. Identifying resilience in proceduralised accident management activity of NPP operating crews. Safety Science 68 (Oct. 2014), 258–274. https://doi.org/10.1016/j.ssci.2014.04.008Google ScholarGoogle ScholarCross RefCross Ref
  27. Manfred Vielberth, Magdalena Glas, Marietheres Dietz, Stylianos Karagiannis, Emmanouil Magkos, and Günther Pernul. 2021. A Digital Twin-Based Cyber Range for SOC Analysts. In Data and Applications Security and Privacy XXXV(Lecture Notes in Computer Science), Ken Barker and Kambiz Ghazinour (Eds.). Springer International Publishing, Cham, 293–311. https://doi.org/10.1007/978-3-030-81242-3_17Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Kim Zetter. 2014. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. Crown Publishing Group, USA.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
    August 2023
    1440 pages
    ISBN:9798400707728
    DOI:10.1145/3600160

    Copyright © 2023 Owner/Author

    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 29 August 2023

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate228of451submissions,51%
  • Article Metrics

    • Downloads (Last 12 months)607
    • Downloads (Last 6 weeks)121

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format