The validation of cyber defense strategies is a critical challenge that becomes even more critical as we consider the lack of realistic data on intrusions enabled by new attack strategies. This paper presents a framework for continuous validation using security twins. Our approach is founded on creating a high-fdelity digital model of an ICT infrastructure, the security twin, and another model of an adversary, an attacker. We use these twins to apply a Monte Carlo method that runs a number of simulations of the intrusions of the attacker. Using the output of these simulations, we generate and validate an Intrusion Graph, a model that details how vulnerabilities can be exploited to orchestrate intrusions into the infrastructure. Each step in the simulated intrusion is validated through a system of pre- and postconditions, ensuring logical and temporal consistency. The primary advantage of this approach is its non-intrusive nature and this results in a rigorous validation and the generation of high-quality synthetic data without disrupting the operational infrastructure. This validated model serves as a powerful tool for training AI-driven defense agents, evaluating countermeasures, and predicting the impact of emerging threats in a dynamic risk landscape.

A Quantitative Framework for the Validation of Twin-Based Cyber Defense

Fabrizio Baiardi
;
Vincenzo Sammartino
2025-01-01

Abstract

The validation of cyber defense strategies is a critical challenge that becomes even more critical as we consider the lack of realistic data on intrusions enabled by new attack strategies. This paper presents a framework for continuous validation using security twins. Our approach is founded on creating a high-fdelity digital model of an ICT infrastructure, the security twin, and another model of an adversary, an attacker. We use these twins to apply a Monte Carlo method that runs a number of simulations of the intrusions of the attacker. Using the output of these simulations, we generate and validate an Intrusion Graph, a model that details how vulnerabilities can be exploited to orchestrate intrusions into the infrastructure. Each step in the simulated intrusion is validated through a system of pre- and postconditions, ensuring logical and temporal consistency. The primary advantage of this approach is its non-intrusive nature and this results in a rigorous validation and the generation of high-quality synthetic data without disrupting the operational infrastructure. This validated model serves as a powerful tool for training AI-driven defense agents, evaluating countermeasures, and predicting the impact of emerging threats in a dynamic risk landscape.
File in questo prodotto:
File Dimensione Formato  
Articolo_Validation_EMSS__entro_30_giugno_.pdf

accesso aperto

Tipologia: Versione finale editoriale
Licenza: Creative commons
Dimensione 319.03 kB
Formato Adobe PDF
319.03 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11568/1323907
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? ND
social impact