分析网络攻击对数字孪生工业组织绩效的影响

IF 10.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS
Ridwan Mustofa , Md. Rafiquzzaman , Niamat Ullah Ibne Hossain
{"title":"分析网络攻击对数字孪生工业组织绩效的影响","authors":"Ridwan Mustofa ,&nbsp;Md. Rafiquzzaman ,&nbsp;Niamat Ullah Ibne Hossain","doi":"10.1016/j.jii.2024.100633","DOIUrl":null,"url":null,"abstract":"<div><p>Digital twin is a virtual copy of their “real-world counterparts”, which refer to physical objects, systems, or entities that exist in the physical world. They share valuable information about how the system works by connecting the replica with the real product via the internet and sensors. In digital twin organizations, industrial control systems and the internet are the main sources of data collection and synchronization, resulting in an increase in cyber-attacks. As a result, they could cause data leaks and be used by hackers to launch attacks without being detected. Researching the appropriate defenses against such attacks is of paramount interest. To that end, in this study, we build an integrated model utilizing the combination of a Dynamic Bayesian Network (DBN) and a Discrete-Time Markov Chain (DTMC) to analyze the considerable consequences of cyberattacks on a digital twin-based organization over different time period. DTMC models recovery and vulnerability for DT-based organizations, and then it is paired with the DBN model to simulate the cyberattack propagation behavior in the organization's IT performance. Next, we calculate the organization's <em>work level</em> and <em>total expected utility</em> under two different cyber-attack scenarios to determine its IT performance and financial behavior. Finally, we evaluate the organization's IT system's reliability and resilience after implementing two prevention mechanisms. Result indicates that Distributed Denial-of-Service (DDoS) cyberattack can cause more destruction to the digital twin organization's IT system than a malware attack in terms of cyberattack propagation, work and utility level, reliability, and resilience capability. The findings of the analysis hold practical applicability in real-world settings, enabling the identification of high-risk cyberattacks within DT-based organizations, the analysis and prediction of an organization's IT performance during actual cyberattacks, and the formulation of effective prevention strategies to address cyber security concerns within DT-based organizations.</p></div>","PeriodicalId":55975,"journal":{"name":"Journal of Industrial Information Integration","volume":"41 ","pages":"Article 100633"},"PeriodicalIF":10.4000,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analyzing the impact of cyber-attacks on the performance of digital twin-based industrial organizations\",\"authors\":\"Ridwan Mustofa ,&nbsp;Md. Rafiquzzaman ,&nbsp;Niamat Ullah Ibne Hossain\",\"doi\":\"10.1016/j.jii.2024.100633\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Digital twin is a virtual copy of their “real-world counterparts”, which refer to physical objects, systems, or entities that exist in the physical world. They share valuable information about how the system works by connecting the replica with the real product via the internet and sensors. In digital twin organizations, industrial control systems and the internet are the main sources of data collection and synchronization, resulting in an increase in cyber-attacks. As a result, they could cause data leaks and be used by hackers to launch attacks without being detected. Researching the appropriate defenses against such attacks is of paramount interest. To that end, in this study, we build an integrated model utilizing the combination of a Dynamic Bayesian Network (DBN) and a Discrete-Time Markov Chain (DTMC) to analyze the considerable consequences of cyberattacks on a digital twin-based organization over different time period. DTMC models recovery and vulnerability for DT-based organizations, and then it is paired with the DBN model to simulate the cyberattack propagation behavior in the organization's IT performance. Next, we calculate the organization's <em>work level</em> and <em>total expected utility</em> under two different cyber-attack scenarios to determine its IT performance and financial behavior. Finally, we evaluate the organization's IT system's reliability and resilience after implementing two prevention mechanisms. Result indicates that Distributed Denial-of-Service (DDoS) cyberattack can cause more destruction to the digital twin organization's IT system than a malware attack in terms of cyberattack propagation, work and utility level, reliability, and resilience capability. The findings of the analysis hold practical applicability in real-world settings, enabling the identification of high-risk cyberattacks within DT-based organizations, the analysis and prediction of an organization's IT performance during actual cyberattacks, and the formulation of effective prevention strategies to address cyber security concerns within DT-based organizations.</p></div>\",\"PeriodicalId\":55975,\"journal\":{\"name\":\"Journal of Industrial Information Integration\",\"volume\":\"41 \",\"pages\":\"Article 100633\"},\"PeriodicalIF\":10.4000,\"publicationDate\":\"2024-05-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Industrial Information Integration\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2452414X24000773\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Industrial Information Integration","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2452414X24000773","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

数字孪生是其 "现实世界对应物 "的虚拟副本,"现实世界对应物 "是指存在于物理世界中的物理对象、系统或实体。它们通过互联网和传感器将复制品与真实产品连接起来,共享有关系统如何工作的宝贵信息。在数字孪生组织中,工业控制系统和互联网是数据收集和同步的主要来源,导致网络攻击增加。因此,它们可能会导致数据泄露,并被黑客用来发动攻击而不被发现。研究针对此类攻击的适当防御措施是重中之重。为此,在本研究中,我们利用动态贝叶斯网络(DBN)和离散时间马尔可夫链(DTMC)的组合建立了一个综合模型,以分析不同时期网络攻击对基于数字孪生的组织造成的严重后果。DTMC 对基于数字孪生组织的恢复和脆弱性进行建模,然后与 DBN 模型配对,模拟网络攻击在组织 IT 性能中的传播行为。接下来,我们计算两种不同网络攻击情况下组织的工作水平和总预期效用,以确定其 IT 性能和财务行为。最后,我们评估了组织 IT 系统在实施两种预防机制后的可靠性和复原力。结果表明,就网络攻击传播、工作和效用水平、可靠性和恢复能力而言,分布式拒绝服务(DDoS)网络攻击比恶意软件攻击对数字孪生组织的 IT 系统造成的破坏更大。分析结果在现实世界中具有实用性,可用于识别数字孪生组织中的高风险网络攻击,分析和预测组织在实际网络攻击中的 IT 性能,并制定有效的预防策略,以解决数字孪生组织中的网络安全问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analyzing the impact of cyber-attacks on the performance of digital twin-based industrial organizations

Digital twin is a virtual copy of their “real-world counterparts”, which refer to physical objects, systems, or entities that exist in the physical world. They share valuable information about how the system works by connecting the replica with the real product via the internet and sensors. In digital twin organizations, industrial control systems and the internet are the main sources of data collection and synchronization, resulting in an increase in cyber-attacks. As a result, they could cause data leaks and be used by hackers to launch attacks without being detected. Researching the appropriate defenses against such attacks is of paramount interest. To that end, in this study, we build an integrated model utilizing the combination of a Dynamic Bayesian Network (DBN) and a Discrete-Time Markov Chain (DTMC) to analyze the considerable consequences of cyberattacks on a digital twin-based organization over different time period. DTMC models recovery and vulnerability for DT-based organizations, and then it is paired with the DBN model to simulate the cyberattack propagation behavior in the organization's IT performance. Next, we calculate the organization's work level and total expected utility under two different cyber-attack scenarios to determine its IT performance and financial behavior. Finally, we evaluate the organization's IT system's reliability and resilience after implementing two prevention mechanisms. Result indicates that Distributed Denial-of-Service (DDoS) cyberattack can cause more destruction to the digital twin organization's IT system than a malware attack in terms of cyberattack propagation, work and utility level, reliability, and resilience capability. The findings of the analysis hold practical applicability in real-world settings, enabling the identification of high-risk cyberattacks within DT-based organizations, the analysis and prediction of an organization's IT performance during actual cyberattacks, and the formulation of effective prevention strategies to address cyber security concerns within DT-based organizations.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Industrial Information Integration
Journal of Industrial Information Integration Decision Sciences-Information Systems and Management
CiteScore
22.30
自引率
13.40%
发文量
100
期刊介绍: The Journal of Industrial Information Integration focuses on the industry's transition towards industrial integration and informatization, covering not only hardware and software but also information integration. It serves as a platform for promoting advances in industrial information integration, addressing challenges, issues, and solutions in an interdisciplinary forum for researchers, practitioners, and policy makers. The Journal of Industrial Information Integration welcomes papers on foundational, technical, and practical aspects of industrial information integration, emphasizing the complex and cross-disciplinary topics that arise in industrial integration. Techniques from mathematical science, computer science, computer engineering, electrical and electronic engineering, manufacturing engineering, and engineering management are crucial in this context.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信