Cargando…
Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach
BACKGROUND: Cyber defense is reactive and slow. On average, the time-to-remedy is hundreds of times larger than the time-to-compromise. In response, Human Digital Twins (HDTs) offer the capability of running massive simulations across multiple domains on the Metaverse. Simulated results may predict...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
JMIR Publications
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10414334/ http://dx.doi.org/10.2196/33502 |
_version_ | 1785087315338592256 |
---|---|
author | Nguyen, Tam N |
author_facet | Nguyen, Tam N |
author_sort | Nguyen, Tam N |
collection | PubMed |
description | BACKGROUND: Cyber defense is reactive and slow. On average, the time-to-remedy is hundreds of times larger than the time-to-compromise. In response, Human Digital Twins (HDTs) offer the capability of running massive simulations across multiple domains on the Metaverse. Simulated results may predict adversaries' behaviors and tactics, leading to more proactive cyber defense strategies. However, current HDTs’ cognitive architectures are underdeveloped for such use. OBJECTIVE: This paper aims to make a case for extending the current digital cognitive architectures as the first step toward more robust HDTs that are suitable for realistic Metaverse cybersecurity simulations. METHODS: This study formally documented 108 psychology constructs and thousands of related paths based on 20 time-tested psychology theories, all of which were packaged as Cybonto—a novel ontology. Then, this study applied 20 network science centrality algorithms in ranking the Cybonto psychology constructs by their influences. RESULTS: Out of 108 psychology constructs, the top 10 are Behavior, Arousal, Goals, Perception, Self-efficacy, Circumstances, Evaluating, Behavior-Controllability, Knowledge, and Intentional Modality. In this list, only Behaviors, Goals, Perception, Evaluating, and Knowledge are parts of existing digital cognitive architectures. Notably, some of the constructs are not explicitly implemented. Early usability tests demonstrate that Cybonto can also be useful for immediate uses such as manual analysis of hackers’ behaviors and automatic analysis of behavioral cybersecurity knowledge texts. CONCLUSIONS: The results call for specific extensions of current digital cognitive architectures such as explicitly implementing more refined structures of Long-term Memory and Perception, placing a stronger focus on noncognitive yet influential constructs such as Arousal, and creating new capabilities for simulating, reasoning about, and selecting circumstances. |
format | Online Article Text |
id | pubmed-10414334 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | JMIR Publications |
record_format | MEDLINE/PubMed |
spelling | pubmed-104143342023-09-12 Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach Nguyen, Tam N JMIRx Med Original Paper BACKGROUND: Cyber defense is reactive and slow. On average, the time-to-remedy is hundreds of times larger than the time-to-compromise. In response, Human Digital Twins (HDTs) offer the capability of running massive simulations across multiple domains on the Metaverse. Simulated results may predict adversaries' behaviors and tactics, leading to more proactive cyber defense strategies. However, current HDTs’ cognitive architectures are underdeveloped for such use. OBJECTIVE: This paper aims to make a case for extending the current digital cognitive architectures as the first step toward more robust HDTs that are suitable for realistic Metaverse cybersecurity simulations. METHODS: This study formally documented 108 psychology constructs and thousands of related paths based on 20 time-tested psychology theories, all of which were packaged as Cybonto—a novel ontology. Then, this study applied 20 network science centrality algorithms in ranking the Cybonto psychology constructs by their influences. RESULTS: Out of 108 psychology constructs, the top 10 are Behavior, Arousal, Goals, Perception, Self-efficacy, Circumstances, Evaluating, Behavior-Controllability, Knowledge, and Intentional Modality. In this list, only Behaviors, Goals, Perception, Evaluating, and Knowledge are parts of existing digital cognitive architectures. Notably, some of the constructs are not explicitly implemented. Early usability tests demonstrate that Cybonto can also be useful for immediate uses such as manual analysis of hackers’ behaviors and automatic analysis of behavioral cybersecurity knowledge texts. CONCLUSIONS: The results call for specific extensions of current digital cognitive architectures such as explicitly implementing more refined structures of Long-term Memory and Perception, placing a stronger focus on noncognitive yet influential constructs such as Arousal, and creating new capabilities for simulating, reasoning about, and selecting circumstances. JMIR Publications 2022-04-20 /pmc/articles/PMC10414334/ http://dx.doi.org/10.2196/33502 Text en ©Tam N Nguyen. Originally published in JMIRx Med (https://med.jmirx.org), 20.04.2022. https://creativecommons.org/licenses/by/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIRx Med, is properly cited. The complete bibliographic information, a link to the original publication on https://med.jmirx.org/, as well as this copyright and license information must be included. |
spellingShingle | Original Paper Nguyen, Tam N Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach |
title | Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach |
title_full | Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach |
title_fullStr | Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach |
title_full_unstemmed | Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach |
title_short | Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach |
title_sort | toward human digital twins for cybersecurity simulations on the metaverse: ontological and network science approach |
topic | Original Paper |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10414334/ http://dx.doi.org/10.2196/33502 |
work_keys_str_mv | AT nguyentamn towardhumandigitaltwinsforcybersecuritysimulationsonthemetaverseontologicalandnetworkscienceapproach |