SYNTHESIS OF THE DIGITAL TWIN OF THE LOGICAL-DYNAMIC INFORMATION AND EVENTS MANAGEMENT SYSTEM FOR THE SECURITY OF COMPUTER SYSTEMS OF THE MOBILE CELLULAR INFORMATION AND COMMUNICATION NETWORK

Authors

  • Ievgen Samborskyi
  • Heorhii Krykhovetskyi

DOI:

https://doi.org/10.26906/SUNZ.2025.4.207

Keywords:

digital twin, management system, information security, security event, synthesis, logical-dynamic model, security event management, mobile network, integration, SIEM, Wazuh

Abstract

The article focuses on the aspect of information security and notes that currently the modern mobile information and communication cellular network is one of the most vulnerable and at the same time important objects of the critical information infrastructure of the state. It serves a wide range of users who make decisions for the organization of public administration, and also provides digital communication to a number of other important systems from the population to departmental structures. That is why this network acts as a priority object in the context of organizing effective management of its information security events. To organize the reliable functioning of this important object, a new approach to the synthesis of a digital twin of the information and security event management system of computer systems of the cellular mobile information and communication network is proposed. The proposed synthesis is based on a logical-dynamic approach to modeling security events in modern computer systems, attack scenarios and mechanisms for responding to these information security incidents by forming appropriate effective control influences. The architecture of the digital twin, the algorithm for its synthesis are considered, and possible approaches for implementing the integration of this virtual object with such platforms as Wazuh, Streamlit, Neo4j, AWS IoT are proposed. Verification and testing are carried out using the example of a DDoS scenario, and the results of the synthesis algorithm implementation are presented. The effectiveness of the model in detecting threats and adapting to intensive changes in the security environment of the computer system of the mobile digital network is shown.

Downloads

Download data is not yet available.

References

1. Samborskyi E. I., Peleshok E. V. Synthesis of Logical-Dynamic Information Management Systems and Security Events of Computer Structures. Control, Navigation and Communication Systems. – 2025. – № 2 (72). – P. 185–194. DOI: https://doi.org/10.26906/SUNZ.2025.2.185-194

2. Pavlenko P. M., Samborskyi Ye. I. Upravlinnia informatsiieiu i podiiamy bezpeky kompiuternykh system iz vykorystanniam lohiko-dynamichnykh modelei. Information Technology and Security. 2025. T. 13, № 1 (24). 43–54. DOI: https://doi.org/10.20535/2411-1031.2025.13.1.328764 [in Ukrainian].

3. Sholokhov S. M., Pavlenko P. M., Nikolaienko B. A., Samborsky I. I., Samborsky E. I. The method of optimizing the distribution of radio suppression means and destructive software influence on computer networks. Radio Electronics, Computer Science, Control. – 2023/2024. – № 4 (67). – P. 16–29. DOI: https://doi.org/10.15588/1607-3274-2023-4-2

4. Cherdantseva Y., Burnap P., Blyth A. et al. A review of cyber security risk assessment methods for SCADA systems. Computers & Security. 2016. Vol. 56. P. 1–27. DOI: https://doi.org/10.1016/j.cose.2015.09.009

5. Radanliev P., De Roure D., Nurse J. et al. Digital twins: Concepts and use cases in cyber security risk assessment. Journal of Cyber Security Technology. 2022. Vol. 6(3). P. 147–174. DOI: https://doi.org/10.1080/23742917.2021.1982822

6. Vasyliev V. V., Kovalenko O. S. Intelektualni systemy vyiavlennia zahroz dlia kiberzakhystu krytychnoi infrastruktury. Kiberbezpeka: osvita, nauka, tekhnika. 2023. № 3. S. 42–49. DOI: https://doi.org/10.28925/2663-4023.2023.3.4249 [in Ukrainian].

7. Gamil A. et al. A framework for real-time threat detection and mitigation using digital twins in IoT networks. IEEE Internet of Things Journal. 2021. Vol. 8(12). P. 9740–9752. DOI: https://doi.org/10.1109/JIOT.2020.3046026

8. Wazuh. The Open-Source Security Platform. Documentation. URL: https://documentation.wazuh.com

9. AWS IoT Developer Guide. URL: https://docs.aws.amazon.com/iot

10. Neo4j Graph Data Platform. URL: https://neo4j.com.

Downloads

Published

2025-12-02

Issue

Section

Communication, telecommunications and radio engineering