A Security Framework in Digital Twins for Cloud-based Industrial Control Systems: Intrusion Detection and Mitigation

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

With the help of modern technologies and advances in communication systems, the functionality of Industrial control systems (ICS) has been enhanced leading toward to have more efficient and smarter ICS. However, this makes these systems more and more connected and part of a networked system. This can provide an entry point for attackers to infiltrate the system and cause damage with potentially catastrophic consequences. Therefore, in this paper, we propose a digital twin-based security framework for ICS that consists of two parts: attack detection and attack mitigation. In this framework we deploy an intrusion detection system in digital domain that can detect attacks in a timely manner. Then, using our mitigation method, we keep the system stable with acceptable performance during the attack. Additionally, we implement our framework on a real testbed and evaluate its capability by subjecting it to a set of attacks.
Original languageEnglish
Title of host publication2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )
PublisherIEEE - Institute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)978-1-7281-2989-1
ISBN (Print)978-1-7281-2990-7
DOIs
Publication statusPublished - 2021
Event26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) - Västerås, Sweden
Duration: 2021 Sept 72021 Sept 10
https://2021.ieee-etfa.org

Conference

Conference26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)
Abbreviated titleETFA 2021
Country/TerritorySweden
CityVästerås
Period2021/09/072021/09/10
Internet address

Subject classification (UKÄ)

  • Computer Science

Fingerprint

Dive into the research topics of 'A Security Framework in Digital Twins for Cloud-based Industrial Control Systems: Intrusion Detection and Mitigation'. Together they form a unique fingerprint.

Cite this