Victoria A. Zakharova
MAI, Moscow, Russia, zakharova062002@mail.ru
Anastasia Y. Kudryashova
MTUCI, Moscow, Russia, a.i.kudriashova@mtuci.ru
DOI: 10.36724/2664-066X-2025-11-5-18-27
SYNCHROINFO JOURNAL. Volume 11, Number 5 (2025). P. 18-27.
Abstract
The study investigates novel methods for modeling complex cyberattacks based on enterprise “digital twin” technology. The aim is to analyze the concept of a “digital twin” as a tool for cyber exercises, compare it with tradition-al cyber ranges, identify current cybersecurity challenges arising from the use of digital twins, and propose methods for addressing them. The research employs comparative analysis, problem systematization, and the design of architecture-oriented solutions based on technologies such as blockchain, swarm intelligence, adversarial attack defense methods, and approaches to verifiable AI explainability. Key advantages of digital twins over traditional cyber ranges have been identified, including dynamic synchronization, modeling accuracy, and predictive capabilities. Fundamental challenges have been systematized, encompassing issues of data reliability, integration, and telemetry processing, as well as new threat classes such as ensuring cyber resilience in “swarms” of interconnected digital twins and securing embedded artificial intelligence. To address these challenges, a comprehensive approach has been proposed, involving decentralized trust systems, collective defense mechanisms, multi-layered AI protection, and verifiable explainability systems. The proposed methods and architectural solutions enable a shift from reactive to proactive cybersecurity strategies, facilitate the creation of self-organizing defense systems, enhance trust in autonomous AI decisions, and lay the foundation for legally compliant auditing in critical infra-structures. The novelty of the work lies in the identification and in-depth analysis of new problem classes related to digital twin ecosystems (“swarms”) and the security of integrated AI, as well as in the proposal of comprehensive, technology-driven solutions, which defines the direction for the development of next-generation cybersecurity systems.
Keywords: digital twin; cybersecurity; cyber studies; attack modeling; cyberpolygon
References
[1] A. S. Minzov, A. Yu. Nevskiy, O. R. Baronov, S.V. Nemchaninova, “Digital Twins in Systems,” Cybersecurity Issues. 2024, No. 2(60), pp. 29-35. DOI: 10.21681/2311-3456-2024-2-29-35.
[2] A. V. Fedorova, V. N. Shvedenko, “The Concept of Applying Digital Twin Technology for Integrating Information Systems of Several Enterprises in Merger Conditions,” Information and Economic Aspects of Standardization and Regulation. 2023, No. 1 (71), pp. 46-51.
[3] I. S. Khorzova, “Application of Cyber Range Capabilities for Training and Advanced Training of Information Security Specialists,” Topical Issues of Security Systems and Secure Telecommunications Systems Operation: Proceedings of the All-Russian Scientific and Practical Conference (Voronezh, June 10, 2021). Voronezh, 2021, pp. 46-47.
[4] E. S. Mityakov, “Digital Twins and Critical Information Infrastructure Security,” Information Security. 2024, pp. 29-34. DOI: 10.37468/2307-1400-2024-4-29-34.
[5] E. S. Mityakov, “Problems of Using Digital Twins in Ensuring Information Security of Critical Information Infrastructure Objects,” Information Technologies and Telecommunications. 2023, pp. 36-47. DOI: 10.31854/2307-1303-2023-11-4-36-47.
[6] A. R. Kasimova, V. V. Zolotarev, L. Kh. Safiullina, A. S. Balyberdin, “Using a Digital Twin in Information Security Management Tasks. Information Protection Methods and Systems,” Information Security. 2023, pp. 49-60. DOI: 10.54398/20741707_2023_1_48.
[7] G. Uteev, R.F. Gibadullin, “Development of a Decentralized Identification System Using Blockchain Technology,” Informatics and Information Processes. 2024, pp. 1-16. DOI: 10.23670/IRJ.2024.142.6.
[8] N. M. Ershov, “Development and Research of Distributed Control Algorithms for Swarm Intelligence Systems,” Mathematical Modeling, Numerical Methods and Software Complexes. 2022, pp. 21-34. DOI: 10.33693/2313-223X-2022-9-2-21-34.
[9] Adversarial Attacks and Defenses in Generative AI [Electronic resource]. URL: https://translated.turbopages.org/proxy_u/en-ru.ru.58e779a5-692dfe10-a7f83868-74722d776562/https/www.geeksforgeeks.org/artificial-intelligence/adversarial-attacks-and-defenses-in-generative-ai (Accessed: 25.11.2025).
[10] N. V. Shevskaya, “Explainable Artificial Intelligence and Methods for Interpreting Results,” Modeling, Optimization and Information Technologies. 2021, pp. 1-12. DOI: 10.26102/2310-6018/2021.33.2.024.
[11] S. S. Galizdra, “Method of biometric identification of a person by a row of teeth based on a photograph with an open smile / S. S. Galizdra, A. Yu. Kudryashova,” Systems for synchronization, formation and processing of signals. 2024. Vol. 15, No. 6, pp. 34-39.
[12] A. Y. Kudriashova, S. S. Galizdra and N. V. Toutova, “Designing Implementation of Additional Modules to Increase the Security and Stability of the Biometric Identification System,” 2025 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF), St. Petersburg, Russian Federation, 2025, pp. 1-5, doi: 10.1109/WECONF65186.2025.11017218.
[13] N. V. Toutova, A. Y. Kudriashova, and S. S. Galizdra, “Implementation of Additional Modules to Increase the Security and Stability of the Biometric Identification System,” 2025 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF), St. Petersburg, Russian Federation, 2025, pp. 1-5, doi: 10.1109/WECONF65186.2025.11017156.
[14] A. Yu. Kudryashova, V. A. Zakharova, “Development of information security measures for defense industry enterprises to implement the Digital Economy 2030 policy,” Telecommunications and Information Technologies. 2024. Vol. 11, no. 2, pp. 45-51.