Vis enkel innførsel

dc.contributor.authorBarbosa Heluany, Jessica
dc.contributor.authorAmro, Ahmed Walid
dc.contributor.authorGkioulos, Vasileios
dc.contributor.authorKatsikas, Sokratis
dc.date.accessioned2024-08-30T06:18:35Z
dc.date.available2024-08-30T06:18:35Z
dc.date.created2024-08-29T09:11:28Z
dc.date.issued2024
dc.identifier.isbn979-8-4007-0565-6
dc.identifier.urihttps://hdl.handle.net/11250/3149177
dc.description.abstractThis research delves into the consolidation of Digital Twin and cyber deception technologies and explores their potential synergy for advancing cybersecurity processes. The study begins with a literature survey and market analysis, revealing a scarcity of mature scientific and commercial contributions in this domain. Most discussions remain theoretical, emphasizing the need for further research to address challenges and practically apply these technologies. Promising applications encompass cyber deception, anomaly detection, and threat intelligence, predominantly utilizing digital twin-based honeypots. The paper contributes by proposing a high-level deception framework tailored for Operational Technology (OT) systems, with seven pivotal functions for a deception network, emphasizing the replication of realistic systems, attracting attackers, controlling connections, monitoring activities, and analyzing detected events. Moreover, an evaluation via a SWOT analysis highlights various strengths, weaknesses, threats, and opportunities inherent in this framework identifying potentially innovative directions such as applications of digital twins, and artificial intelligence. Strengths include improved defender control and enhanced security analysis, while challenges revolve around achieving high realism in digital twins and managing restoration complexities. This study sets a roadmap for further exploration into the effective integration of Digital Twin and honeypot technologies in cybersecurity contexts.
dc.description.abstractInterplay of Digital Twins and Cyber Deception: Unraveling Paths for Technological Advancements
dc.language.isoengen_US
dc.publisherACMen_US
dc.relation.ispartof2024 ACM/IEEE 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) and 2024 IEEE/ACM Second International Workshop on Software Vulnerability (EnCyCriS/SVM '24)
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleInterplay of Digital Twins and Cyber Deception: Unraveling Paths for Technological Advancementsen_US
dc.title.alternativeInterplay of Digital Twins and Cyber Deception: Unraveling Paths for Technological Advancementsen_US
dc.typeChapteren_US
dc.description.versionpublishedVersion
dc.identifier.doi10.1145/3643662.3643955
dc.identifier.cristin2290312
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal