SYNTHESIS OF THE DIGITAL TWIN OF THE LOGICAL-DYNAMIC INFORMATION AND EVENTS MANAGEMENT SYSTEM FOR THE SECURITY OF COMPUTER SYSTEMS OF THE MOBILE CELLULAR INFORMATION AND COMMUNICATION NETWORK
DOI:
https://doi.org/10.26906/SUNZ.2025.4.207Keywords:
digital twin, management system, information security, security event, synthesis, logical-dynamic model, security event management, mobile network, integration, SIEM, WazuhAbstract
The article focuses on the aspect of information security and notes that currently the modern mobile information and communication cellular network is one of the most vulnerable and at the same time important objects of the critical information infrastructure of the state. It serves a wide range of users who make decisions for the organization of public administration, and also provides digital communication to a number of other important systems from the population to departmental structures. That is why this network acts as a priority object in the context of organizing effective management of its information security events. To organize the reliable functioning of this important object, a new approach to the synthesis of a digital twin of the information and security event management system of computer systems of the cellular mobile information and communication network is proposed. The proposed synthesis is based on a logical-dynamic approach to modeling security events in modern computer systems, attack scenarios and mechanisms for responding to these information security incidents by forming appropriate effective control influences. The architecture of the digital twin, the algorithm for its synthesis are considered, and possible approaches for implementing the integration of this virtual object with such platforms as Wazuh, Streamlit, Neo4j, AWS IoT are proposed. Verification and testing are carried out using the example of a DDoS scenario, and the results of the synthesis algorithm implementation are presented. The effectiveness of the model in detecting threats and adapting to intensive changes in the security environment of the computer system of the mobile digital network is shown.Downloads
References
1. Samborskyi E. I., Peleshok E. V. Synthesis of Logical-Dynamic Information Management Systems and Security Events of Computer Structures. Control, Navigation and Communication Systems. – 2025. – № 2 (72). – P. 185–194. DOI: https://doi.org/10.26906/SUNZ.2025.2.185-194
2. Pavlenko P. M., Samborskyi Ye. I. Upravlinnia informatsiieiu i podiiamy bezpeky kompiuternykh system iz vykorystanniam lohiko-dynamichnykh modelei. Information Technology and Security. 2025. T. 13, № 1 (24). 43–54. DOI: https://doi.org/10.20535/2411-1031.2025.13.1.328764 [in Ukrainian].
3. Sholokhov S. M., Pavlenko P. M., Nikolaienko B. A., Samborsky I. I., Samborsky E. I. The method of optimizing the distribution of radio suppression means and destructive software influence on computer networks. Radio Electronics, Computer Science, Control. – 2023/2024. – № 4 (67). – P. 16–29. DOI: https://doi.org/10.15588/1607-3274-2023-4-2
4. Cherdantseva Y., Burnap P., Blyth A. et al. A review of cyber security risk assessment methods for SCADA systems. Computers & Security. 2016. Vol. 56. P. 1–27. DOI: https://doi.org/10.1016/j.cose.2015.09.009
5. Radanliev P., De Roure D., Nurse J. et al. Digital twins: Concepts and use cases in cyber security risk assessment. Journal of Cyber Security Technology. 2022. Vol. 6(3). P. 147–174. DOI: https://doi.org/10.1080/23742917.2021.1982822
6. Vasyliev V. V., Kovalenko O. S. Intelektualni systemy vyiavlennia zahroz dlia kiberzakhystu krytychnoi infrastruktury. Kiberbezpeka: osvita, nauka, tekhnika. 2023. № 3. S. 42–49. DOI: https://doi.org/10.28925/2663-4023.2023.3.4249 [in Ukrainian].
7. Gamil A. et al. A framework for real-time threat detection and mitigation using digital twins in IoT networks. IEEE Internet of Things Journal. 2021. Vol. 8(12). P. 9740–9752. DOI: https://doi.org/10.1109/JIOT.2020.3046026
8. Wazuh. The Open-Source Security Platform. Documentation. URL: https://documentation.wazuh.com
9. AWS IoT Developer Guide. URL: https://docs.aws.amazon.com/iot
10. Neo4j Graph Data Platform. URL: https://neo4j.com.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Ievgen Samborskyi, Heorhii Krykhovetskyi

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.