Management of information and security events of a mobile cellular network using a digital twin

Authors

DOI:

https://doi.org/10.20535/2411-1031.2025.13.2.344719

Keywords:

digital twin, control system, information security, logical-dynamic model, mobile network, Wazuh

Abstract

The article focuses on the consideration of currently existing approaches to effectively ensure the information security of modern and promising mobile means of digital communication. It is noted that the modern mobile information and communication cellular network is one of the most important and at the same time vulnerable objects of the critical information infrastructure of the state. This network serves a significant number of users, who, as a rule, make decisions for the organization of effective state management, and also provides digital communication to a number of other subscribers, from the general population to all departmental corporate structures. That is why this critical network acts as a priority object in the context of the organization of effective management of its information security events. To organize the reliable functioning of this important critical information object, a new approach to the synthesis of algorithmic support of the digital twin of the information and event management system of computer systems of the cellular mobile information and communication network has been proposed.The proposed synthesis is based on the logical and dynamic modeling of the currently existing wide range of security events in modern control systems of information and communication networks, attack scenarios and response mechanisms to these information security incidents due to the formation of appropriate effective control influences on the processes of compensation for their destructive consequences. The architecture of the digital twin, the algorithm for its synthesis are considered, as well as possible approaches for the implementation of the integration of this virtual object with such platforms as Wazuh, Streamlit, Neo4j, AWS IoT are proposed. Verification and testing are carried out on the example of a scenario of a typical DDoS attack, the results of the implementation of the algorithm for the synthesis of a digital twin are presented. The effectiveness of the model in adapting to intensive variations in the security environment of the computer system of the cellular mobile digital network is shown. It is noted that the proposed architecture of the digital twin due to the implementation of the appropriate algorithmic and software product will provide cyberization of information and communication network nodes, security events, computer system states in the implementation of security management and response scenarios to the vast majority of all possible information security incidents. It is concluded that the proposed synthesis algorithm allows sequentially implementing the key stages of building a digital twin for the virtual representation of a digital communication system, including the formalization of security events, the construction of logical transitions in computer systems and integration into real structures of the information and communication network.

Author Biography

Іеvgen Samborskyі, Lesya Ukrainka Volyn National University, Lutsk

senior lecturer of the department of computer science and cybersecurity

References

E.I. Samborskyi, and E.V. Peleshok,“Synthesis of Logical-Dynamic Information Management Systems and Security Events of Computer Structures”, Control, Navigation and Communication Systems, no. 2 (72), рр. 185-194, 2025, doi: https://doi.org/10.26906/SUNZ.2025.2.185-194.

P. Pavlenko, and E. Samborsky, “Management of information and security events of computer systems using logical-dynamic models”, Information Technology and Security, vol. 13, iss. 1 (24), pp. 43-54, 2025, doi: https://doi.org/10.20535/2411-1031.2025.13.1.328764.

S.M. Sholokhov, P.M. Pavlenko, B.A. Nikolaienko, I.I. Samborsky, and E.I. Samborsky “The method of optimizing the distribution of radio suppression means and destructive software influence on computer networks”, Radio Electronics, Computer Science, Control, no. 4 (67), рр. 16-29, 2023, doi: https://doi.org/10.15588/1607-3274-2023-4-2.

Y. Cherdantseva et al., “A review of cyber security risk assessment methods for SCADA systems”, Computers & Security, vol. 56, рр. 1-27, 2016, doi: https://doi.org/10.1016/j.cose.2015.09.009.

M. Repetto, “Cybersecurity Digital Twins: Concept, blueprint, and challenges for multi-ownership digital service chains”, Journal of Information Security and Applications, vol. 96, art. 104299, 2025, doi: https://doi.org/10.1016/j.jisa.2025.104299.

K. Praveenkumar et al., “Digital Twins Driven by Artificial Intelligence to Mitigate, Detect, and Simulate Virtual Space Cyber Threats”, in Proc 2025 International Conference on Computational Innovations and Engineering Sustainability (ICCIES), Coimbatore, Tamilnadu, India, 2025. DOI: https://doi.org/10.1109/ICCIES63851.2025.11032312.

T. Kuklinova, “Intellectualization of Cybersecurity of Energy Enterprises: A Management Approach”, in Information Security and Infrastructure of Information and Communication Systems: An Interdisciplinary Approach: Monograph, S. Horbachenko, and A. Sokolov, Eds. Lviv, Ukraine: Liha-Pres, 2025 pp. 71-102. doi: https://doi.org/10.36059/978-966-397-537-5-3.

“The Open-Source Security Platform. Documentation”, Wazuh. [Online]. Available: https://documentation.wazuh.com. Accessed: Aug. 1, 2025.

“AWS IoT Developer Guide”, Amazon Web Services. [Online]. Available: https://docs.aws.amazon.com/iot. Accessed: Aug. 1, 2025.

“Graph Data Platform”, Neo4j. [Online]. Available: https://neo4j.com. Accessed: Oct. 1, 2025.

Published

2025-11-27

How to Cite

Samborskyі І. (2025). Management of information and security events of a mobile cellular network using a digital twin. Collection "Information Technology and Security", 13(2), 346–356. https://doi.org/10.20535/2411-1031.2025.13.2.344719

Issue

Section

ELECTRONIC COMMUNICATION SYSTEMS AND NETWORKS