Next Article in Journal
Digitized Construction of Iontronic Pressure Sensor with Self-Defined Configuration and Widely Regulated Performance
Next Article in Special Issue
Investigating the Effectiveness of Novel Support Vector Neural Network for Anomaly Detection in Digital Forensics Data
Previous Article in Journal
Understanding Physicochemical Mechanisms of Sequential Infiltration Synthesis toward Rational Process Design for Uniform Incorporation of Metal Oxides
Previous Article in Special Issue
Blockchain Token-Based Wild-Simulated Ginseng Quality Management Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Blockchain-Enabled Secure Digital Twin Framework for Early Botnet Detection in IIoT Environment

Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Seoul 01811, Korea
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(16), 6133; https://doi.org/10.3390/s22166133
Submission received: 30 June 2022 / Revised: 12 August 2022 / Accepted: 14 August 2022 / Published: 16 August 2022
(This article belongs to the Special Issue Security, Cybercrime, and Digital Forensics for the IoT)

Abstract

:
Resource constraints in the Industrial Internet of Things (IIoT) result in brute-force attacks, transforming them into a botnet to launch Distributed Denial of Service Attacks. The delayed detection of botnet formation presents challenges in controlling the spread of malicious scripts in other devices and increases the probability of a high-volume cyberattack. In this paper, we propose a secure Blockchain-enabled Digital Framework for the early detection of Bot formation in a Smart Factory environment. A Digital Twin (DT) is designed for a group of devices on the edge layer to collect device data and inspect packet headers using Deep Learning for connections with external unique IP addresses with open connections. Data are synchronized between the DT and a Packet Auditor (PA) for detecting corrupt device data transmission. Smart Contracts authenticate the DT and PA, ensuring malicious nodes do not participate in data synchronization. Botnet spread is prevented using DT certificate revocation. A comparative analysis of the proposed framework with existing studies demonstrates that the synchronization of data between the DT and PA ensures data integrity for the Botnet detection model training. Data privacy is maintained by inspecting only Packet headers, thereby not requiring the decryption of encrypted data.

1. Introduction

The Industrial Internet of Things is modernizing Smart Cities with its capacity to assist in the rapid decision-making process of optimizing the manufacturing methods and facilitating the flow of goods. The management of raw materials, manufacture of goods, assembly-line production, final packaging and warehousing of goods are interconnected using heterogeneous devices [1,2]. Smart Factories are enriched by the automation of the production cycle delivering reduced times to produce goods, increase business profits, and promote further opportunities in innovation for greater flexibility and improved efficiency [3,4,5]. Device-to-Device communications further enable a comprehensive overview of the industrial environment where sensors collaborate with each other, sharing data for the further optimized performance of industrial machines. Decision-making processes are further expedited by reducing the time to compute data from Cloud to Fog/Edge environments [6,7,8].
The Industrial Revolution (IR) from IR 3.0 to IR 4.0 supported by IIoT has greatly fueled the growth of Smart Cities with a rapid response to the growing demands of its economy [9,10,11]. However, the transition to Industry 4.0 has increased the risks to network security due to weak and ineffective security protocols in IIoT devices. The reduced computation capacity and battery power restrict the implementation of strong security methods directly on the devices [12,13,14]. Moreover, the heterogeneity of devices implemented in a single Smart Factory restricts a common security protocol implementation for the system-wide network. Botnet attacks present a dual risk to the Industry 4.0 network [15,16]. Firstly, the compromise of devices using brute-force attack methods risk exposure of private data to unauthorized entities. Furthermore, the security of data is compromised, as cyber attackers modify and inject corrupt data, affecting the network’s performance. Secondly, Distributed Denial of Attacks (DDoS) further risks the entire network’s operational performance, resulting in failure device data computation, data modeling, and analysis for operational performance [17,18].
Cloud-based Intrusion Detections Systems using Artificial Intelligence (AI) detect and identify anomalies in the IIoT traffic, but they are generally ineffective for time-sensitive applications such as Manufacturing Factories that rely on high efficiency to outmatch consumer demands [19]. DT technology has recently been explored for the early detection of malicious behavior in the network traffic originating from the physical IIoT devices. DTs are virtual twins of physical devices and synchronize data amongst each other using bi-directional communication channel. Modifications made to the physical devices are mirrored in their DTs and vice versa [20,21]. Furthermore, their integration with AI models encourages advanced modeling techniques for the early detection of malicious behavior such as botnet activity before devices are fully weaponized to launch full-scale DDoS attacks on the network servers.
In this paper, we propose a Blockchain-enabled Digital Twin Framework for the early detection of botnet activity in an IIoT environment. The Framework integrates DT, physical IIoT devices, Deep Learning model, Blockchain, and Smart Contracts for securing the data flow of a Smart Factory environment. The framework implements a private blockchain managed by a security vendor to register DTs, and a virtual node, PA, which is responsible for securely synchronizing the DT data with physical devices using Smart Contracts. Network traffic monitoring using Deep Learning inspects and analyzes both encrypted and unencrypted traffic using packet headers. The model inspects for the early detection of botnet behavior, alerting the security vendor to modify network policies and isolate other Digital Twins from the infected group of devices.
The motivation for writing this paper is to address the growing concerns of botnet-based cyberattacks on the Industry 4.0 network. The main contributions of this paper include the following.
  • A DT environment of the IIoT enables implementation of robust security protocols that leverage resources from the edge datacenters.
  • A private blockchain registers DTs as transactions in Blocks preventing malicious nodes from injecting corrupt data into the data stream, affecting the data integrity of the collected data.
  • A virtual node, PA, is registered with the Private Blockchain and captures the network using a boundary set by the security vendor to detect Replay attacks on DTs.
  • DT synchronization is established securely with the PA to identify if any packets between the physical IoT and the virtual twin are dropped. The protocol detects man-in-the-middle attackers between physical–virtual twins.
  • The Deep Learning botnet-detection model inspects unique IP addresses and half-open connections, indicating an open communication channel between the device and the botnet Command and Control server.
  • A comparative analysis with existing research shows that the proposed framework provides data security, integrity, privacy, device availability, and non-repudiation.
The remainder of this paper is organized as follows. Section 2 discusses the existing state-of-the-art studies in securing Industrial networks against cyberattacks. In Section 3, we present the overview of the proposed system and discuss its workflow process in detail. In Section 4, we perform a comparative analysis of the proposed scheme with recent studies. The weaknesses of other schemes and future research areas are discussed, and, finally, in Section 5, we conclude our paper.

2. Related Work

Botnet detection has been extensively researched in recent years; however, they do not fulfill the growing requirements of the growing IIoT environment. In this section, we discuss the various state-of-the-art related works and present the key areas of consideration for a secure and reliable framework designed for the early detection of botnet activity.

2.1. Existing Research

Several botnet-detection studies for IoT devices focus on implementing an AI model using both centralized and distributed classification methods. A Zero-day botnet-detection method for IoT–Edge devices is presented by Popoola et al. [22], implementing a Federated Learning approach for traffic-anomaly detection. Several local models are trained directly on IoT–Edge devices using the Deep Neural Network model to ensure data privacy concerns. After several rounds of training on local devices, the global model is updated using the aggregated results of local models. A Bot–IoT dataset is used to simulate a botnet scenario achieving high detection rates but requires a long training time compared with other centralized training models. A two-fold machine learning approach by Hussain et al. [23] focused on identifying botnet behavior prior to a cyberattack against the network. A dataset generated from three publicly available datasets includes 33 scan types and 60 DDoS attacks. Using a dual machine learning approach, the first ResNet-18 model scans local IoT devices for scanning activity indicative of botnet behavior. The second ResNet-19 model focuses on identifying DDoS attacks and alert the system of a botnet-based attack. Though the research indicates that early botnet behavior detection is essential for network security, its dual machine learning approach still relies on identifying a DDoS attack for a botnet detection behavior. An automated approach for botnet detection in IoT devices is presented by Trajanovski [24] integrates honeypots with a sandbox environment. The objective is to analyze devices with varying software and hardware configurations and prevent attackers by performing anti-forensics and anti-analysis techniques. Identified attacking devices are blacklisted from connecting with the network. Several Command-and-Control servers use botnets as broadcast devices for a cyberattack, which may include critical devices for a Healthcare, Manufacturing, or an Internet of Vehicles environment. The blacklisting of devices is unsuitable for modern Smart City environments. A visualized botnet detection framework proposed by Vinayakumar et al. [25] focuses on identifying botnets in a Smart City environment. A two-level deep learning model first identifies the most frequent DNS queries performed on Ethernet connections in conjunction with a threshold value. A Deep-Learning-based Domain generation algorithm classifies benign and malicious domain addresses.
Blockchain-based anomaly-detection solutions in IoT environments focus on securing the network using distributed and scalable solutions. Hayat et al. [26] implemented a Machine-Learning-based DDoS attack-mitigation method by initially registering all devices in the decentralized network. The study suggests ejecting malicious devices failing to authenticate with the Blockchain network. Each interacting device requires prior registration with the network before inter-communicating with other devices. The proposed approach does not address that several botnets are pre-registered IoT devices with the Blockchain network; thus, an attacker is already an existing network member. The study by Lekssays et al. [27] suggests that modern botnets implement a P2P architecture to increase their chance of infecting a wider area of IoT devices. The authors proposed a dynamic botnet-detection method using Blockchain for establishing trust between IoT devices and internet service providers. The privacy of various actors is preserved by associating pseudo-IDs for each member. The detection model requires a consensus among all blockchain members to eject the device from the network upon the detection of malicious activity. Sun et al. [28] proposed a lightweight permissioned Blockchain network for IoT devices where each device is assigned a public key based on its identity attributes to filter authorized devices from invalid requests. To avoid the delay in data processing in the decentralized environment, a policy decision point algorithm identifies Blockchains’ node-making real-time off-chain decisions. Xu et al. [29] proposed a Bi-directional attack proof Blockchain using chameleon hash functions for the IoT environment. The Committee Members Auction consensus algorithm provides high scalability and attack resistance of the decentralized network. Secret sharing distributes secret keys to network members via Smart Contracts, ensuring only authorized members participate in the network.

2.2. Comparison Study

In this sub-section, we describe the open challenges of the existing research and compare them with the contributions of the proposed Blockchain-enabled Secure Digital Twin framework. We examine how the proposed framework further improves the data security of the IIoT environment with Deep Learning models
First, we discuss and compare the contributions of studies that focus on botnet detection by implementing AI- and Honeypot-based systems with the proposed framework. The Federated-Learning-based framework proposed in [22] relies on training data as local models on the IoT devices, preventing user data transfer on edge networks for data privacy. The objective of this study depends on retaining the raw IoT data on the device layer, preventing external entities from accessing user data. IoT devices with low computational resources are incapable of running resource-taxing deep learning models; thus, the feasibility of the study remains unanswered. Furthermore, the research does not evaluate the performance impact of directly implementing computationally expensive deep learning models directly on resource constraint IoT devices. The two-fold machine learning approach in [23] initiates DDoS attack detection after the IoT devices are compromised. The study’s objective is focused on increasing the DDoS’s attack-detection accuracy and does not address the security or privacy of IoT devices and data. The IoT botnet-detection framework presented in [24] does not inspect IoT devices for growing malicious behavior and instead relies on a honeypot environment for active botnet behavior detection. The study’s objective is to avoid the attacker’s detection of a Honeypot environment and not to prevent its existence and growth. The Visualized botnet-detection system proposed in [25] relies on training the deep learning model using DNS data on a centralized server. The transmission of IoT data from IoT devices presents data security, integrity, and privacy risks. A man-in-the-middle attack easily compromises the deep learning model using poisoning attacks.
The proposed framework implements the botnet-detection deep learning model on the edge layer, utilizing the vast available computational resources compared to the device layer. Training on the edge layer reduces the risk of the poor performance of the deep learning model training on IoT devices as present in [22]. Even though the proposed framework implements a centralized deep learning approach, the PA-DT synchronization reduces the risks of poisoning attacks affecting the botnet-detection system. Implementing the DT synchronization with the PA reduces the risks of poisoning attacks present in the studies [23,25]. The synchronization protocol of DT-PA prevents the compromise in the deep learning training dataset and maintains the detection accuracy of the botnet training model. Furthermore, the synchronization protocol identifies any man-in-the-middle attacks, thus enabling the early detection of cyberattacks on the IIoT environment. In the proposed framework, DT certificates enable a botnet-spread-prevention policy in the IIoT environment managed by the security vendor. Upon identification of an infected DT, the security vendor revokes its corresponding IoT devices from communicating with other DTs. The honeypot-based study in [24] relies on botnet behavior detection. Still, it does not present a method to contain the spread of the malicious scripts transmitted from compromised IoT devices to benign devices. A security vendor is forced to either let the IoT devices function without any security policy or shut down all devices until a security firmware is patched, thus impacting operational performance in the IIoT environment.
Finally, the remaining research focuses on deploying blockchain technology as the primary security model for the secure authentication of IoT devices and secure storage of IoT data. The Blockchain-based Multilevel DDoS Mitigation mechanism proposed in [26] requires each device to possess a signature for communicating with the server and avoid being blocked from communicating. Signature verification of each device using Smart Contracts with Blockchain introduces delays due to frequent transaction requests in a real-time scenario. Thus, the model is unsuitable for IIoT environments such as Smart Factories, Healthcare, and Smart Energy-based environments. The PAutoBotCatcher framework presented in [27] registers devices in the blockchain following whitelist and blacklist mechanisms. The framework successfully blacklists all infected devices using their IP addresses; however, a man-in-middle-attack using a spoofed IP address is able to transmit flooding attacks on the server. As the new IP address is blacklisted, the attacker dynamically changes their address and resumes the attack. The Blockchain-based IoT access system presented in [28] proposes a localized, decentralized ledger for establishing which IoT devices have access to offload data for computation at the edge layer. The research focuses on preventing unauthorized entities from accessing the system server. However, the lack of an active traffic flow detection protocol prevents the system from identifying the growing botnet activity, resulting in registered and authenticated devices launching DDoS attacks. The Bidirectional-linked Blockchain system presented in [29] prevents cyber attackers from taking control of the blockchain network using secret keys. The study’s main objective is to present a robust defense for the system server but does not secure the IoT devices directly. A committee-member-based consensus mechanism selects which users are selected to join the network. A lack of security measures between the edge layer and the device-layer-compromised devices enables malicious users to transmit corrupt data to the system server.
In the proposed framework, IoT devices do not individually connect with the server but do so using a DT, where each DT is allotted an authentication certificate. A single DT enables a collective cluster of associated IoT devices from communicating with the network. The DT-based certificate approach addresses the challenge present in [26] of frequent authentications, resulting in network congestion due to poor transactions/minute in the Blockchain system. The time-boundary-based DT-PT synchronization protocol actively identifies compromised IoT devices by inspecting transmitted packets. The vulnerability of an attacker using a spoofed address present in [27] is identified early by the security vendor before a large-scale cyberattack takes place. The study in [28] establishes access control for IoT devices using blockchain but lacks a robust traffic-anomaly detection-protocol. Addressing this vulnerability, the proposed framework implements a dual traffic-anomaly-detection process, the DT-PA synchronization protocol and the deep-learning-based botnet-detection model. The dual-anomaly-detection approach actively identifies man-in-the-middle attacks such as Delay-and-Replay attacks and detects DDoS attacks using Deep Learning. Traffic flows to the network. The active DT-PA synchronization protocol identifies registered IoT devices in a DT transmitting their attack packets and limits the growth of botnet behavior by revoking the DT certificate, thus addressing the vulnerability found in [29], where registered devices continue to transmit attack packets.

2.3. Key Considerations

A botnet-detection framework for IIoT devices in Smart Factories requires a secure data synchronization method and the quick identification of malicious activity in the network. The following five key considerations are essential to our proposed framework and their comparative analysis is illustrated in Table 1.
  • Data Security—Data transmission from IoT devices to virtual twins at the edge layer require authorization measures preventing malicious entities from accessing confidential Industrial data. A framework based on sharing data ownership to untrusted entities requires an authentication mechanism to ensure only trusted nodes have access.
  • Data Integrity—Deep Learning models require accurate captured data to train and detect botnet open channels in the IoT devices. A botnet-detection framework requires a data verification protocol to verify if data in transmission are modified. Modification of data at the virtual twins through man-in-the-middle attacks reduces the reliability in the accurate detection of True positives and True negatives.
  • Data Privacy—Industrial data secrets shared via IP packets risk being exposed when analyzed using Deep Learning methods. A privacy-preserving framework focusing on Packet Header information reduce the risk of data exposure to unauthorized entities.
  • Availability—Devices identified with botnet activity risk infecting other sensors using brute-force methods. Successful detection of infected devices should be isolated from spreading botnet scripts to other benign devices. The availability of benign devices is essential not to halt the entire industrial network operation.
  • Non-Repudiation—Malicious packet data shared by infected devices are required to be securely stored in tamper-proof environments such as Blockchain. Infected devices ID and IP address are essential for record-keeping for future security firmware updates.

3. Proposed Framework

This section presents the overview and the components used in the Digital Twin enabled DDoS attack-prevention framework for IoT enabled Smart Cities. The device layer consists of several physical entities such as Factories, Hospitals, and Vehicles that operate independently supported by embedded sensors. A DT of each entity is maintained at the edge layer to monitor the network flow. A security vendor is responsible for maintaining the security of the DT and operates a Deep Learning model to analyze the DT behavior for anomalous behavior. Attack-detection at the DT improves the scalability of the network and reduces attack-detection time. The fine-grain inspection of each device’s traffic increases the computational load over time, such as when a hospital or factory adds the number of sensor devices in its network based on its demand.
A Consortium Blockchain network maintained by the security vendor is responsible for recording the identified malicious activity indicative of growing Botnet activity on the Blockchain. As the botnet targets are not necessarily on the same cloud server of the infected entity, the security vendor is required to submit the alert to other security vendors and a Cyber-Crime unit of the developing botnet activity. Furthermore, in the workflow sub-section, we illustrate and present the detailed process flow of the botnet-detection process, DT ranking, Blockchain data storage, and the Smart Contract initiated to alert other security vendors. Table 2 illustrates the abbreviations used in the framework.

3.1. Overview of the Proposed Framework

The proposed scheme consists of the several elements participating in the botnet-detection process, DT ranking and Profile generation, and network alert of botnet-generation process.
  • IoT devices are identified as physical devices that gather and upload data to the cloud for processing. Each device is responsible for generating data from varying sources such as machinery, transport vehicles, assembly lines, and private devices in homes and offices. Devices are heterogeneous with varying security protocols, computing power, and battery power.
  • Using the example of a Smart Factory, different manufacturing processes, such as raw material management, assembly line production, and packaging, deploy several sensors. Each process deploys several sensors that communicate data with other processes. The DT of each separate process, such as assembly-line production, is designed on the edge layer that synchronizes and mirrors data flowing in the local network. A DT provides a surveillance for all devices and access points within its cluster. Data collected at this layer trains the local Deep Learning model to actively search for botnet-spread behavior. Computation power is provided by local edge-based datacenters to the DT, thus reducing the necessity of running Deep Learning models on IoT devices with low computational power and battery capacity.
  • A Security Vendor monitors the DT using the Deep Learning model and maintains the ranking profile for each DT under their supervision. In this paper, we assume the Security Vendor is responsible for maintaining and monitoring the network security of four different DTs of a Smart Factory environment.
  • Security Vendors manage a private blockchain for storing the rank of each DT identified with a high risk of botnet activity. Each security vendor operates separately and monitors several organizations, such as a group of Hospitals or Factories.
  • Individual security vendors initiate Smart Contracts for alerting other security managers of a possible security attack. Records are submitted of each contract as a transaction in the Blockchain to ensure the chain of custody.
As illustrated in Figure 1 and presented in Algorithm 1, the proposed framework is based on the following process.
Step 1.
IoT devices in the factories collect data from the machinery and share with the edge for computation and analysis.
Step 2.
DTs present at the edge layer synchronize data with their respective departments in a factory, such as the production floor ( D T 1 ), raw-materials management ( D T 2 ), assembly line ( D T 3 ), and packaging and warehousing ( D T 4 ). Each department is represented by an application which collects raw data from IoT devices and forwards to the edge for processing. For example, the production floor collects all data from the sensors deployed in the manufacturing and processing of goods.
Step 3.
Ensuring only authorized DTs are allowed to send data, they are registered in the private blockchain. A separate PA is registered, which facilitates data-synchronization between the DT and IoT devices.
Step 4.
DT and the PA synchronize data to ensure industry traffic is not intercepted by unauthorized entities. Data collected by the DT are used for training the model for botnet detection and requires security from man-in-the-middle attacks.
Step 5.
DTs represent the network topology, traffic load, and the benign and malicious traffic flowing in their network. Data are captured at this junction to analyze and identify botnet activity.
Step 6.
TCP/UDP packet headers are collected to analyze unencrypted packet data. IP packets such as Hypertext Transfer Protocol Secure (HTTPS) are Secure Socket Layer (SSL) encrypted and thus the Botnet detection identified using packet headers inspects both HTTP and HTTPS traffic.
Step 7.
Features are collected from the DTs that include both TCP and UDP packets. Packet time to arrive, open or closed connections, and the IP addresses used are collected for analysis.
Step 8.
In this study, to simulate a botnet detection, malicious packet flow is introduced in D T 1 . D T 2 , D T 3 , and D T 4 are benign virtual cluster of devices and are potential targets of growing botnet activity.
Step 9.
Successful classification of D T 1 with botnet activity, the security vendor initiates prevention measures for the growing botnet activity. All traffic from the infected device DT is isolated from inter-communicating with devices from the benign DTs and prevents the botnet activity’s spread. As each DT includes all devices and local gateway access points such as routers, all outbound traffic at D T 1 is excluded from sending packets to D T 2 , D T 3 , and D T 4 .
Step 10.
Each Smart Contract is recorded in the Blockchain to maintain the chain of custody during investigations into the source of attacks and device security firmware management.
Algorithm 1 The proposed Blockchain-enabled Secure Digital Twin Framework
Input: D e v i c e 1 n ,   D T 1 4 ,   P A , TCP/UDP packets
  • Initialization Phase:
  • Distribute   devices   ( D e v i c e 1 p , D e v i c e 1 q , D e v i c e 1 r ) based on factory processes.
  • Assign   factory   process   1     4   to   D T 1 4
  • Split   Devices   to   D T 1 , D T 2 , D T 3 , and D T 4 .
  • Register   D T n ( D e v i c e s n ) in the private blockchain and assign certificate
  • D T 1 n transmits and shares data with other D T 1 n
  • Synchronize   data   between   D T 1 4 and PA to determine
  •               if   ( D T p a c k e t s =   P A p a c k e t s )
  •               return network secure
  •          else
  •                             return   register   IP   addresses   and   D T n in private blockchain
  •          end if
  • Collect TCP/UDP packet headers
  • Train deep learning model using collected packets
  • Assign IoT devices their group based on their process
  •          if botnet activity = false
  •               return network secure
  •          else
  •                             return   register   IP   addresses   and   infected   D T n in private blockchain
  •                             revoke   compromised   D T n certificate to prevent inter DT communication
  •          end if
  •   End
IoT devices include varying types of embedded sensors with differing battery and computational resources. A common DT ensures security protocols are feasible across all devices despite device heterogeneity. IP headers provide data from both from encrypted and unencrypted packets. The Blockchain network prevents malicious nodes from sending false data to the network, raising multiple false alarms preventing security vendors from learning true attack scenarios.

3.2. Workflow of the Proposed Scheme

This section describes the process flow of the proposed scheme based on four phases. First, DT and a PA are registered with the Blockchain to ensure only authorized virtual twins receive data from IoT devices. Secondly, an authorized PA ensures the secure synchronization and capture of IoT packet data for DT synchronization. Thirdly, traffic inspection of packets using Deep Learning are analyzed for botnet activity. Lastly, DT isolates inter-DT communication to prevent the growth of the botnet traffic and initiates the collection of infected data using a certificate generated by the PA for each DT.

3.2.1. Packet Auditor and Digital Twin Registration

Each PA and DT are first registered with the Blockchain network to prevent malicious nodes from transmitting false alarms to the security vendor. We assume the PA is a secure virtual node and monitored by the Security Vendor. As illustrated in Figure 2, PA and DT registration process flow is as follows.
Step 1.
The security vendor generates a new and unique Packet Auditor ID ( P A I D ) using a nonce value for randomness and the first five values of the hash value generated based on the number of devices paired with the DT.
Step 2.
A transaction ( T x n 1 ) is created in the Blockchain network using the new P A I D . The P A I D is first encrypted using a public key generated ( P P u b K ).
T x n 1 = P P u b K P A I D
Step 3.
The private blockchain node verifies if the network has an existing PA registered. If a P A I D exists, the transaction will not proceed.
Step 4.
If P A I D is not found, then the new P A I D is registered using a Smart Contract. A new block in the network is created, and, as such, other blocks in the Blockchain are aware of it.
Step 5.
Once registered a certificate ( Cert DT ) is generated for each DT associated with the PA, a second transaction is created ( T x n 2 ) to register the new certificate using the Private Key ( P P r v K ) belonging to the PA. A certificate ensures that all future intercommunicating DTs can validate if the other DT is not a malicious virtual twin and not part of the network.
T x n 2 = D T p u b K   P P r v K P A I D
Step 6.
Once T x n 2 is processed using the public key of the DT ( D T p u b K ), D T 1 obtains the certificate using its private key ( D T p r v K ).
Step 7.
The certificate is distributed to D T 1 . Each new certificate using the P P r v K of PA generates T x n n for D T n .
Step 8.
The public keys of the DTs are stored in the Blockchain to prevent a malicious node from spoofing as a valid DT and attempting to access or corrupt private data.
Step 9.
The PA is further responsible for recording the IP addresses of each IoT device included in D T n and registering them on the Blockchain. This step prevents an attacker from joining their malicious node as part of a valid D T n .
The secure registration of each DT and the PA enables the security vendor to establish that data transmission in the DT are from valid nodes. The recording of IP addresses prevents an external entity from adding nodes into the DT and transmitting corrupt data. Furthermore, the secure and immutable records stored in the private blockchain prevents an external entity from interacting with other IoT devices and injecting scripts.

3.2.2. Digital Twin Synchronization

As both PA and DT are registered in the Blockchain in the network, the synchronization between DT and IoT devices is monitored. The objective of the synchronization monitoring is to periodically verify if data in transmission between the DT and its devices are not modified in transmission. Any modification is indicative that private data have been intercepted and monitored by unauthorized entities. The process to synchronize data between the DT and PA is based on two phases. In the first phase, the PA captures the data lifecycle of the devices within a DT. Secondly, the DT shares its packet flow captured at a defined state and requests the PA to synchronize and validate the data.
As shown in Algorithm 2, the process flow for the first phase, capturing data life cycle is based on the flowing steps.
Step 1.
The PA generates a new profile for each DT included in its network. Each DT in a factory undergoes various phases of the product-development lifecycle, and a vast amount of data is generated. Profiles stored in the DT are kept on a temporary phase and not stored on the Blockchain. Once a DT synchronizes the data with the PA, the profiles are removed. However, in the event of an attack detection, the PA captures profiles and actively stores them in the private blockchain and establish records of malicious activity for future investigation.
Step 2.
The PA is supported by cloud resources; however, capturing real-time data on the PA incurs a very high storage cost and thus a boundary is established which is followed by both the PA and DT during synchronization.
Step 3.
For each DT, a new profile ( P r o f D T ) is generated, where the timestamp of captured packets ( t s t m p i ), their Device IDs ( D I D ), and the IP addresses of packet sources ( I P s r c i ) and destinations ( I P d s t i ) are collected as part of an individual Profile. Here, i represents the captured packets.
P r o f D T = D I D I P s r c n ,   I P d s t n ,   t s t m p n
The P r o f D T is a collection of the basic information of each packet collected. The packet payload is not collected and stored due to storage concerns and operational costs.
Step 4
The data collection time boundary is selected by the security vendor to reduce the amount of data collected. Each boundary limit varies in days, hours, and minutes, where packet data are collected. Each time-boundary consists of an upper ( b d u p p e r ) and lower boundary ( b d l o w e r ) to ensure a precise data collection period and storage limitations.
D T n = ( b d u p p e r ,   b d l o w e r   P r o f D T
Each boundary limit set by the security vendor by the PA is also applicable on the DT for accurate synchronization. The security vendor is responsible for initiating the synchronization process, after which all P r o f D T in the PA are removed.
Algorithm 2 Digital Twin synchronization
Input: P r o f D T ,     D T n ,   D I D ,   I P s r c n ,   I P d s t n ,   t s t m p n ,   b d u p p e r ,   b d l o w e r ,   P A , Cert DT , D T p r v K , D T p u b K , P A I D , P P r v K , P P u b K
  • Begin:
  • Design   new   P r o f D T :
  • Select time boundary
  • Vendor   =   b d u p p e r h h : m m : s s ,   b d l o w e r h h : m m : s s
  • Assign   time   boundary   to   P r o f D T
  •       for   ( DT = 1   to   D T n ) do
  •       P r o f D T ( b d u p p e r ,   b d l o w e r ) = Vendor ( b d u p p e r ,   b d l o w e r )
  •     End for
  • Authenticate:
  • Encrypt DT Certificate
  • Encrypt   Cert DT with D T p r v K
  • D T n ( D T p r v K ( Cert DT )) → Blockchain
    Decrypt and Verify DT Certificate
  •       if   D T n ( D T p u b K ( Cert DT )) = True
  •     return DT authentication successful
  •    else
  •         Cert DT not found. Authentication failed
  •    end if
  • Encrypt PA ID
  • Encrypt   P A I D with P P r v K
  • P A ( P P r v K )) → Blockchain
  • Decrypt and Verify PA ID
  •       if   PA   ( P P u b K ( P A I D ) = True
  •           return PA authentication successful; initiate DT Sync
  •    else
  •                 P A I D not found. Authentication failed
  •    end if
  • Initate Sync
  • Verify   D T n   P r o f D T with the PA
  •       if   P r o f D T ( b d u p p e r ,   b d l o w e r ) = Vendor ( b d u p p e r ,   b d l o w e r )
  •          return Initiate Sync
  •             if   P A D I D I P s r c n ,   I P d s t n ,   t s t m p n = D T   D I D I P s r c n ,   I P d s t n ,   t s t m p n
  •             return packets match
  •                     D T   D I D I P s r c n ,   I P d s t n ,   t s t m p n → Blockchain
  •          else
  •                Profiles mismatch. Update security vendor.
  •                           D T   D I D I P s r c n ,   I P d s t n ,   t s t m p n )) → Blockchain
  •            end if
  •         else
  •                         return   P r o f D T profile mismatch. Update security vendor
  •         end if
  • End
The PA temporarily stores the data until the DT successfully synchronizes its collected data. In the second phase, the DT synchronization process is initiated. The process flow for synchronizing the packet data between the DT with the PA, as illustrated in Figure 3, are as follows.
Step 1.
Prior to the synchronization process, DT initiates a sync request by transmitting its C e r t D T signed by its D T p r v K . We assume entities in the network operate in an untrusted environment, where each node is suspected to be a malicious node.
Step 2.
The private blockchain network verifies the C e r t D T using the stored D T p u b K . If the certificate is found valid, a Smart Contract is initiated between the DT and the PA. If, however, the D T p u b K fails to verify the certificate, it is assumed to be an invalid request.
Step 3.
The PA submits its P A I D signed using its P P r v K . The Blockchain network verifies the P A I D using the stored P P u b K . If the P A I D is found valid, the Smart Contract’s security conditions are fulfilled, and the synchronization process initiates.
Step 4.
The P r o f D T stored in the DT and the P r o f D T stored in the PA share the same time limit of captured data, and, thus, the DT is required to only share the D T n along with the time boundaries, b d u p p e r ,   b d l o w e r , that are the start and end timestamps, when packets are recorded.
Step 5.
The PA analyzes the D T n to locate the correct profile and verifies if the b d u p p e r ,   b d l o w e r matches with its stored D T n . If it matches, the PA transmits the D T n with the DT and fulfills its Smart Contract condition.
Step 6.
The DT based on each D I D data flowing in its network matches the Device IDs shared by the PA, such that,
P A D I D I P s r c n ,   I P d s t n ,   t s t m p n = D T   D I D I P s r c n ,   I P d s t n ,   t s t m p n .
Step 7.
If the b d u p p e r ,   b d l o w e r does not match in the D T n , then an invalid request is sent as a reply to the DT, the Smart Contract is closed. If the boundaries match, data synchronization proceeds normally.
Step 8.
Packet flow between the DT and the PA is synchronized, and data are verified.
Step 9.
The results of the contract are registered in the Blockchain as a transaction, and the outcome of the synchronization is recorded.
If the packet data matched, the synchronization-state protocol is successful, and the process will repeat itself. If, however, the timestamps varied due to differing time boundaries, the framework records a malicious activity in the DT. The timestamp between the packets received by the PA from the IoT device and those recorded by the DT indicates a Delay attack.

3.2.3. Network Traffic Monitoring

The packet Inspection of both TCP and UDP packets include features that are both unencrypted compared to their payloads and do not require deep inspections of payloads to reduce the time to train the Deep Learning (DL) model. Feature extractions are identified to include packets from IP addresses that are unique, i.e., devices transmitting data to unknown sources that are indicative of two outcomes, the attack target server is external to the factory’s cloud server, or the devices are communicating with external IoT nodes to inject malicious scripts. Bots transmit malicious scripts to different IP addresses that are not part of the local network and target vulnerable sensors belonging to other networks, such as Healthcare, Logistics, and Office Buildings. The framework focuses on inspecting random IP addresses for inspection, which are expected to exhibit higher malware traffic than legitimate traffic flow. Furthermore, the number of random IP addresses is higher, as bots do not transmit scripts to the same IP address repeatedly to avoid detection and to infect several devices in the shortest time and initiate a DdoS attack as soon as possible.
Other features selected for inspection include the monitoring of the half-open connections between devices as bots open several connections with other devices with invalid requests without receiving a reply to ACK messages. Such methods indicate a possible TCP SYN flood attack, where an attacker attempts to make a server unavailable by flooding it with several requests, leaving all ports of the target in half-open state. Furthermore, we include the maximum, minimum, and average size of packets in our feature classification, as several malwares transmit fewer headers compared to benign packets. Smaller packets require more packets to be transmitted, resulting in a flood-based attack on the target server. The Maximum Transmission Packet size is set at 1500 bytes, whereas attacks packets send packets of 90 bytes [30], increasing the count of the packets transmitted. Lastly, the time difference in packet transmissions is inspected, as reduced time intervals indicate an increased count of packets transmitted to the destination server compared with legitimate traffic.
Botnets maintain an open connection of TCP traffic with the Command and Control (CnC) server by exchanging PUSH and ACK messages, a behavior exhibited by the Mirai botnet actively sending commands and tracking the count of devices included in the botnet [31]. The detection of infected devices is identified, demonstrating frequent connections with unique IP addresses, indicative of two scenarios, a connection with an attack target or a connection with the C&C server. We correlate the results of devices that have frequent half-open connections with unique IP addresses as the source of the C&C server.
In this paper, we implement the Long-Short-Term Memory (LSTM), a variant of the Recurrent Neural Network ideal for a large collection of packet data and where the data captured have high similarity. Since the amount of traffic originating from IoT devices is considered large in size, we implement the LSTM model for the botnet training. The advantage of LSTM over other models is where they maintain a memory cell that preserves the earlier sequential input data and manage long-term dependencies. The model consisting of input, forget, and output gates collects long-term dependencies and uses a sigmoid function to filter data at each gate.

3.2.4. Device Isolation

In the final phase of the framework, infected devices are recognized by their IP addresses. The Security Vendor is alerted to the presence of a botnet and issues a network policy update for device isolation. The process flow for device isolation, as presented in Algorithm 3, is as follows.
Step 1.
The IP addresses of infected devices are recorded and analyzed with the records stored in the Blockchain along with their associated DT. The certificate of the DT is used to isolate the device from communicating with other DTs.
Step 2.
The Security Vendor initiates a network-wide policy update by initiating a Smart Contract with DTs ( D T 2 ,   D T 3 , and D T 4 ). Each DT is required to prove their validity by sharing their certificates, which have been signed using their private keys D T p r v K .
Step 3.
The Blockchain network verifies the certificate of each DT using their respective D T p u b K . Failure to verify the validity of the Certificate results in the connection being terminated.
Step 4.
Once the proof of identity is validated, the security vendor issues a revoke command of D T 1 ’s certificate, preventing any inter-device communication to prevent the spread of botnet scripts.
Step 5.
The revocation of the D T 1 ’s certificate is stored in the Blockchain along with the policy update issued to other DTs.
Algorithm 3 Device Isolation
Input: P r o f D T ,     D T n ,   Cert DT , D T p r v K , D T p u b K , Security Vendor
  • Begin:
  • Revoke   D T n :
  •         for   ( DT = 1   to   D T n ) do
  •        Encrypt DT Certificate
  •             Encrypt   Cert DT with             D T p r v K
  •             D T n ( D T p r v K ( Cert DT )) → Blockchain
        Decrypt and Verify DT Certificate
  •                       if   D T n ( D T p u b K ( Cert DT )) = True
  •                return DT authentication successful
  •                                     if   D T n ( ( Cert DT )) = True             // Verify if D T n is compromised
  •                                             return   revoke   D T n ( ( Cert DT ))
  •                                             D T n ( ( Cert DT )) → Blockchain // Record revoked Certificate in Blockchain
  •                  else
  •                                             return   D T n ( ( Cert DT )) is verified
  •                  end if
  •          else
  •                         return   Cert DT not found. Authentication failed
  •          end if
  •      end for
  • End
The revocation of the DT’s certificate mirrors the policy on the physical devices, and, as such, all physical devices associated with D T 1 are blocked from communicating with D T 2 ,   D T 3 , and D T 4 . The secure recording of the actions taken by the framework on the private blockchain network ensures the maintenance of the chain of custody of all steps taken by the security vendor to secure the factory environment from future cyberattacks.

4. Analysis

In this section, we evaluate the performance of the proposed Blockchain-enabled Secure Digital Twin Framework for early botnet-behavior-detection with existing studies. We first analyze the performance of the PA- and DT-synchronization protocol for early detection of man-in-the-middle attacks. The performance is evaluated based on latency and accuracy of the synchronization protocol and compared with a baseline model. Secondly, we study the impact of an ongoing cyberattack on the transaction processing speed for increased validation of PA and DT and compare it with the existing studies. Finally, we analyze the impact of a DdoS attack on the Blockchain nodes affecting the transaction processing speed. We analyze the attack resistance on the PoA algorithm used in the proposed framework’s private blockchain and compare it with existing studies. Finally, using the feature selection based on the traffic identified from the PA-DT synchronization, we compare the botnet-detection model’s accuracy, precision, recall, and F1 scores with existing studies.

4.1. Evaluation Environment

The proposed framework is evaluated using a system running an Ubuntu 18.0.4 operating system using a 4.0 Ghz i7 processor and 64 GB RAM. Smart Contracts are designed using Solidity for authenticating DT and PA. The Private Blockchain is designed using the Proof of Authority consensus model where the block validator is limited to only the security vendor. We removed the requirement for the mining of blocks using complex cryptographic puzzles and enabled the security vendor to be the sole authority to approve new block mining. Physical IoT devices are represented using 5 Raspberry PI B+ with 2 GB RAM with 1.5 Ghz processor. A sixth Raspberry device represents the smart factory manufacturing process application, receiving traffic from other IoT devices. Using VirtualBox, we make a DT of the 6th Raspberry Device, the Physical Twin ( P T ) of which represents the DT on the edge layer. Data is mirrored between each P T IoT device and its virtual counterpart, D T , for maintaining synchronization. The PA uses a Docker Container with Wireshark to monitor collected packet data.
The Botnet-detection protocol is evaluated using the Bot–IoT Dataset [32,33,34,35,36,37] generated by the Cyber Range Lab of UNSW Canberra. The traffic dataset contains a total of 72 million records consisting of both benign and malicious botnet traffic. Attack types are focused on the most frequent of cyberattacks, DDoS and DoS attacks. The dataset is based on an 80:20 split based on training and testing sets, respectively. As stated in Section 3.2.3 of Network Traffic Monitoring, we focus on the count of half-open TCP connections and the maximum and the minimum counts of packets based on the uniqueness of their IP address. We include these connections on the premise that they are more likely to connect with external servers and launch cyberattacks. Furthermore, the feature selection also includes the mean count of packets for each unique IP address. Other features include the mean packet length to identify if the attacker attempts to launch a flooding attack using a small packet size. The feature selection is based on identifying the relevant features and excluding redundant data that serves no benefit in the botnet detection. Overfitting is a challenge, and the LSTM model implements a dropout value of 0.2 and uses two hidden layers. The count of hidden nodes increases from 23 to 64 and finally to 128. The evaluation of the model is based on 100 rounds to demonstrate its performance using the identified features.

4.2. Digital Twin and Packet Auditor Analysis

We first measure the impact on performance during the DT synchronization with the PT, which helps us evaluate the real-time application of DTs for other time-sensitive applications such as Healthcare. Second, we observe the latency and CPU consumption in packet synchronization between the DT and PA and compare it with a baseline model that detects packet exchanges in real-time. In this stage, we introduce malicious packets in the data stream of DT to evaluate the duration of identifying transmission of malicious information by the PA.
As illustrated in Figure 4a, the delay in terms of the recording of the packet stream on the DT is minimal compared to the real-time traffic in PT. An average delay of 0.002 milliseconds (ms) enables the DT to mirror real-time operations for time-sensitive tasks. Table 3 outlines the performance of the PA-DT synchronization protocol.
From Figure 4b, we observe that the CPU utilization of the PT and DT during state synchronization is nearly the same. Both DT and PT are set to use the same amount of CPU resources as the 1.5 Ghz processor based on the Raspberry PI B + device. Table 4 illustrates the analysis of the DT-PT synchronization CPU consumption.
We set the P r o f D T using Equation (4) to analyze the captured data by the PA and compare with the data stream captured by the DT. As both DT and PA are separate entities, PA is designed using cloud resources using a Container with Wireshark operating. The application captures data and checks to verify if Equation (5) is true. For the sake of the experiment, we set eight different P r o f D T , i.e., the duration of the upper boundary is set at 0 days, 0 h, 10 min, and 0 s. The lower boundary is set at 0 days, 0 h, 1 min, and 0 s. The remaining P r o f D T values are set consecutively till 0 days, 0 h, 2 min, and 0 s, and the lower boundary remains unchanged. Malicious traffic is injected in the DT data stream, increasing the flow of the packet to cause a flooding attack.
As shown in Figure 5a, we observe that, the larger the selected upper boundary, the higher the time difference in analyzing the collected packets from the DT increases. To offset the performance impact, the security vendor has the ability to modify both the upper and lower boundary limits as stated in Equation (3),
D T n = ( b d u p p e r ,   b d l o w e r   P r o f D T .  
We compared the performance of the PA with a baseline model using real-time packet analysis between the PA and the DT. The detection time between the baseline model and the proposed framework are nearly identical, where the real-time model outperforms packet analysis by 0.003 s. Table 5 outlines the performance of all eight P r o f D T , where the lowest difference recorded is 0.002 s, and the highest time difference is 0.005 s. We attribute the higher performance of the baseline model due to the active detection of variation in packets. In Figure 5b, we observe a high consumption of CPU resources in the baseline model, where the average difference is 6.73% between the models. The proposed framework outperforms the baseline model due to the lower and upper boundary limits that define when the PA packet analysis process is initialized.
From the evaluation of the Latency and CPU consumption of both the DT-PT mirror transmission and the PA analysis of the packet inspection with the DT, we observe that the proposed framework consumes fewer network resources in terms of CPU utilization and has low latency in maintaining a virtual profile of the Smart Factory PT on the edge layer for real-time operations. Furthermore, the proposed framework identifies malicious scripts or poison attacks during DT-PT transmission, thus ensuring data security and integrity.

4.3. Blockchain Scalability and Attack Resistance

In this section, we observe the private blockchain’s performance in terms of scalability in managing the growing count of the authentication requests of PA inspection by the security vendor. Secondly, we analyze the transaction speed and the attack resistance of the consensus model during active DDoS attacks.
The private blockchain in the proposed framework deploys the Proof of Authority consensus model, where the Security Vendor is the sole validator of the transactions and blocks. As the process is automated, it does not require manual approval from the validator to approve each to be block mined and transaction processed. However, the validator does have the manual override option to prevent the formation of new locks in the event of a DDoS attack or a 51% attack on the network. From Figure 6, we analyze the transaction frequency when the Smart Factory is under a cyberattack and the Security Vendor requires frequent recording of authentication approvals for recording new PA-DT packet audit analysis. The PoA maintains a steady average transaction speed of 20 s to process and record each request of PA and DT authentication requests in the block. We attribute the improvement in performance of the PoA over existing studies that implement the Practical Byzantine Fault Tolerance [27,28] and the Committee Members Auction [29] consensus models, due to the restriction of using only a single Validator. Furthermore, we kept the block size at 300 kb enabling the storage of more transactions per block and reducing the requirement to mine more blocks. Smaller block sizes require higher transactions per second. As the number of transaction requests increases to 200, the time consumed to approve transactions remains steady at 20 s. The Practical Byzantine Fault Tolerance implemented by Lekssays et al. [27] and Sun et al. [28] require 440 s. The Committee Members Auction implemented by Xu et al. [29] performed better than other models due to its 2 s mandatory waiting time; however, it performed poorly compared to PoA due to its higher number of validators.
The Blockchain network under a cyberattack such as a DDoS attack or 51% attack enables an attacker to acquire control over the authentication-processing requests and gain access to user data stored in Blocks. Furthermore, an attacker adds to and approves malicious transactions in the blocks, corrupting the data required by the Security Vendor to maintain records of cyberattacks on the networks and which IoT devices are infected with bot scripts.
As illustrated in Figure 7, we observe the attack resistance of the PoA consensus model in comparison with related studies. We observe the PoA has a steady transaction speed despite the growing number of block nodes being compromised due to the blocks being pre-validated. The generation and approval of blocks are granted to only a single validator, the security vendor. In the event that the number of compromised nodes grows, the validator excludes them from the list of approved blocks allowing the network to process transactions at a steady average rate of 21 transactions per second. Other proposed models. such as those proposed by Xu et al. [29], Sun et al. [28], and Lekssays et al. [27], have high resistance to DDoS attacks; however, they are compromised when the count of nodes exceeds the count of valid nodes.

4.4. Botnet Detection

Our botnet-detection LSTM model is based on the Accuracy, Precision, Recall, and F1 scores. Accuracy refers to packets correctly identified as benign or attack traffic and is based on the following equation:
T r u e   P o s i t i v e + T r u e   N e g a t i v e T r u e   P o s i t i v e + T r u e   N e g a t i v e + F a l s e   P o s i t i v e + F a l s e   N e g a t i v e
Precision represents the model’s ability to correctly label benign traffic as True Negative and is represented by the following equation:
T r u e   P o s i t i v e T r u e   P o s i t i v e + F a l s e   P o s i t i v e
Recall is the model’s ability to correctly identify positives as True Positives and avoid incorrectly labelling them as Negative.
T r u e   P o s i t i v e T r u e   P o s i t i v e + F a l s e   N e g a t i v e
The F1 score is represented as the mean between the precision and the recall values and is represented by the following equation:
2 × p r e c i s i o n r e c a l l p r e c i s i o n + r e c a l l  
Figure 8 illustrates the performance comparison of the LSTM compared with existing studies. The LSTM model performs more accurately, which is attributed to the feature-selection process focusing on the mean packet arrival rate and the half-open connections. The accuracy of the LSTM is measured the highest at 99.97% after the completion of the 100th round of training. The CNN model presented by Vinayakumar et al. [25] performed the lowest in terms of accuracy, demonstrating the performance impact of converting features into a visualized format for anomaly detection. Popoola et al. [22] proposed a Federated Learning model approach, and, for comparison, we measured the final global model’s performance. Each model used a different dataset, highlighting the impact of feature selection on the model’s performance. Table 6 presents the Precision, Recall, and F1 score comparison for quantitative analysis with existing studies.
In our proposed LSTM model, the dataset is classified into test and training datasets. We implemented class weights for the two classes, benign and attack, during the training of our model. Class imbalance is determined by the assigned weights, and, in our model, weights were allocated based on the number of instances. High weightage is allocated to minority classes, i.e., those with fewer instances. Accuracy obtained the highest by 100th round, and further rounds of training did not increase the accuracy any further. The dropout value is retained at 0.2, and the number of hidden nodes increases from 23 to 64 and then to 128. The model implements a single input layer, two hidden layers, and a single output layer. Adding any further hidden layer did not improve the result. We select the output function as a sigmoid and tanh as the activation function. The LSTM model bases the accuracy of DDoS attacks on the count of packets with unique IP addresses. The accuracy, precision, recall, and F1 scores are determined using Equations (6)–(9). The study in [22] implements the Federated Deep Learning model, where the accuracy, precision, recall, and F1 score are analyzed using the similar BoT–IoT dataset as used in our LSTM botnet-detection model. However, the poor class imbalance in their training dataset of the deep neural network model results in lower performance of the precision, recall, and the F1 score. The study in [23] trains the Resnet-18 model based on several datasets; however, for fair comparison in our evaluation, we consider the results for the BoT–IoT dataset. The performance of their model is acquired from their research results. The dataset is divided into a similar 80:20 split. Finally, the study in [25] focuses on collecting DNS data using the Amrita dataset. The DNS-based approach, though, differs from the proposed LSTM model and other related work, it signifies that the impact of packet inspection yields better results. The DNS-based approach resulted in the lowest accuracy, precision, recall, and F1 scores compared to the proposed framework and related studies using the Bot–IoT dataset.

5. Discussion

In this section, we analyze the security of the Proposed Framework based on the five key areas of consideration for a reliable and robust framework for Digital-Twin-enabled IIoT environment from cyberattacks. Several existing studies either partially do not or entirely do not satisfy all five key areas of consideration for a secure IIoT framework from cyberattacks. Botnet detection in [22,23,24,25] relies on AI for securing IIoT networks from cyberattacks. Popoola et al. [22] implemented a Federated-Learning-based approach that guarantees Data security and Privacy by training models locally on the IoT-Edge devices. The lack of raw device data transmission to a centralized server removes the risk of man-in-the-middle-based attacks. Furthermore, the privacy of data is safeguarded as only local model updates are shared with external nodes, reducing the risk of unauthorized access to industrial data. However, Data integrity and Device Availability are chiefly unaddressed concerns, as IoT devices are of high risk to botnet attacks resulting in Poisoning attacks. Local uploaded models are trained using inaccurate data, reducing the effectiveness and reliability of the Federated-Learning-based botnet-detection method. Hussain et al. [23] implemented a dual machine learning approach, where the first model, ResNet-18, scans devices for botnet activity and the second, ResNet-19, model analyzes network traffic for DDoS attacks. The method does not meet any of the key areas of consideration, as data is flowing from IoT devices to centralized servers from model training and testing, and there are no proposed measures for identifying Delay and Replay attacks. Data security, Integrity, and Privacy are easily compromised. Device Availability is not ensured, as their proposed method relies first on identifying a DDoS attack first, and then scans devices for botnet behavior. C&C servers compromise devices and control device availability to the network, i.e., an attacker shuts down the device and wipes all sensor data. Trajanovski et al. [24] proposed an automated framework for botnet identification relying on a sandboxed Honeypot environment for trapping cyber attackers and blacklisting compromised devices. The framework addresses the identification of compromised devices after an attack takes place and thus does not ensure data security, integrity, privacy of sensor data, or the availability of devices after an attack is detected. The reactive approach in place of a proactive approach reduces its ability to secure IIoT environments from cyber-attacks. VinayaKumar et al. [25] presented a botnet-detection framework using Deep Learning to inspect Domain Name System logs for advanced persistent botnets. The deep learning model is exposed to man-in-the-middle attacks, resulting in data modification; therefore, Data security and integrity are compromised. Furthermore, the availability of devices is not addressed in the framework, as compromised devices continue to transmit data to the deep learning model and the Smart City servers.
Blockchain-based related studies [26,27,28,29] partially address Data Integrity concerns by registering all authorized devices with the decentralized network. The vulnerability of compromised new devices registered to the network reduces their ability to ensure Data security. However, each of these proposed models addresses non-repudiation, as each device is authorized and is traceable when anomalous traffic is detected. Hayat et al. [26] presented a botnet prevention method, where compromised devices are removed from the list of registered devices. The presented architecture relies on a Cloud-based model for data storage that introduces delays in the response time to attacks. Furthermore, the exposure to a single-point-of-failure vulnerability in Cloud data storage affects Data Privacy and Security concerns. Lekssays et al. [27] proposed a botnet detector for early botnet detection before an attack is initiated. The study focuses on maintaining users’ privacy using pseudo identities when initiating scans for malicious activity. However, the study does not discuss IoT device security, resulting in unaddressed device-availability concerns. Sun et al. [28] presented a Blockchain-based anomaly-detection system using device identity and attribute-based detection systems. The study focuses on preventing DoS attacks on the Blockchain network due to repeated access requests. A permissioned blockchain provides access control for communication requests; however, a lack of security measures exposes registered IoT devices to being infected with malicious scripts. The proposed system fails to prevent attackers from launching DoS attacks using registered devices. Xu et al. [29] proposed a bidirectional-linked Blockchain using a Committee Members Auction consensus algorithm for blockchain security. The vulnerability of the consensus algorithm in securing nodes is when an attacker initiates DDoS attacks on 51% of all available nodes. The studies in [27,28,29] have robust inter-device secure communication protocols using Blockchain networks for authentication. However, none of the studies address device availability concerns to prevent an infected device from installing malicious scripts on other devices.
Next-generation IIoT environments such as Smart Factories are increasingly adopting Digital Twin-based networks for the virtualized improvement of the conceptual design of products, their development, and the overall production process and reducing the overall costs of final physical implementations. The security of these DTs from cyber-attacks resulting from Botnet formation is an existing challenge. The proposed Blockchain-enabled Secure Digital Twin Framework focuses on securing the data-collection process from unauthorized entities for a reliable and robust botnet-detection model. The security of DTs is addressed to prevent incorrect and expensive conceptualization of the virtual model implemented in the physical production process, incurring a high financial burden on the factory to redesign and re-implement the DT.
In the proposed framework, each DT and the PA is registered on the Blockchain network to ensure data collection is achieved from an authorized set of IoT devices. Each authorized DT validates itself to the decentralized network before transmitting data to the Deep Learning model for botnet detection. Each data point transmitted is further verified by synchronizing the packet data collected by both DT and the PA, reducing the risk of man-in-the-middle attacks and ensuring data security and Integrity. The collection of packet data by the Deep Learning model includes only Packet Headers enabling analysis of encrypted data without requiring them to be decrypted. Deep Packet Inspection of encrypted packets is not required, ensuring Data Privacy is maintained. The detection of an infected DT is prevented from inter-digital communication by revocation of the certificate. Devices that are part of an infected digital twin are blocked from transmitting data to other machines to prevent the spread of the botnet script and ensure the availability of non-compromised IoT devices. Lastly, recording IP addresses in the Blockchain network allows the network to accurately establish and label all infected devices that are part of a DT as compromised and requires a firmware update procedure to remove the botnet script and close software security vulnerabilities.
Smart City services, such as Healthcare, Infrastructure management, Retail, and Energy management deploy DT to analyze, predict, and optimize the performance of the physical-world environment. Industries focus on adopting a proactive approach using real-time monitoring for future uptime and downtime to ensure minimal loss to quality of service. Cyberattacks are a constant concern for the Smart City infrastructure, where user-data integrity and privacy are chief concerns. The vulnerability of sensors to botnet attacks is ever growing. The proposed Blockchain-enabled Secure Digital Twin Framework allows industries to adopt a proactive approach and detect weakness in the network early, before a Man-in-the-Middle or DDoS attack takes place. Using the example of a Hospital in a Smart Healthcare environment, the design of the DTs of different patients, where each patient is connected using various sensors, enables the prediction of patient health, such as drug reaction. Sensors transmit data to their respective DT for data analysis using AI models. Man-in-the-middle attacks either prevent packet arrival at the edge layer or intercept and transmit corrupt data to poison the AI models. As devices are pre-registered in the Blockchain network, an attacker delays packet-data transmission or injects malicious data spoofing as the registered device. A separate PA collects patient data on a defined period set by the Healthcare IT department or the selected security vendor and compares the packets collected by the Digital Twins. The continuous monitoring of packets enables a Hospital to ensure that all AI models are trained using accurate patient data. If device data is altered in the transmission between the physical device and the DT, the IT manager or security vendor is alerted to a possible attack and logs the malicious Digital Twin along with its associated IP addresses of infected IoT devices in the Blockchain network. A second attack parameter involves a botnet formation where an attacker attempts to flood packets to the Digital Twin and cause a Denial of Service at the Edge layer. Using PA, the framework prevents poisoned data from being used to train the botnet model. As patient data privacy is a chief concern, only packet headers are monitored to prevent the need for decrypting packets. Infected Digital Twins are isolated from communicating with other Digital Twins and prevent the spread of botnet growth. The IT administrator or Security Vendor assigns a security firmware update to secure the physical devices from future botnet attacks. The proposed framework is especially important for future Smart City services, as the next IR 4.0 is shifting towards DT for optimizing their services. A proactive Blockchain- and DT-enabled cybersecurity framework supports future networks with a proactive approach to identify both man-in-the-middle and botnet attacks and take steps for network security before other devices are compromised.

6. Conclusions

This paper presented a Blockchain-enabled Digital Twin Framework for securing IIoT environments against Cyberattacks. Digital Twins of the Smart Factory are designed on the edge layer; they synchronize data with their respective IoT devices. A Smart Contract is designed to secure the registration and authentication of all network entities with the private blockchain network. Digital Twins and Packet Auditor securely authenticate and validate with the Blockchain network and synchronize data, ensuring packet data are not modified in transmission. The process flow of each process was discussed in detail. The Deep Learning-based model inspects traffic of both encrypted and unencrypted packets and identifies devices infected with malware. The device isolation policy prevents the infection of other Digital Twins, preventing the growth of botnet activity. Future work will focus on designing IP-tracing methods to accurately identify command and control servers connecting with devices using a multi-hop method. In our future work, we aim to study the impact of Mobile Digital Twins for Logistics and general Transportation services using a Cloud–Edge architecture with support for extended mobility.

Author Contributions

Conceptualization, M.M.S. and A.K.C.; Formal analysis, M.M.S. and A.K.C.; Funding acquisition, J.H.P.; Investigation, M.M.S. and A.K.C.; Methodology, M.M.S. and A.K.C.; Software, M.M.S., T.N. and H.P.; Supervision, J.H.P.; Writing-original draft, M.M.S., A.K.C., T.N. and H.P.; Writing-review and editing, M.M.S. and J.H.P. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2022R1F1A1071926).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The study does not support reported data.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kim, M.; Kim, K.; Kim, J.H. Cost Modeling for Analyzing Network Performance of IoT Protocols in Blockchain-Based IoT. Hum.-Cent. Comput. Inf. Sci. 2021, 11, 1–14. [Google Scholar]
  2. Abosata, N.; Al-Rubaye, S.; Inalhan, G.; Emmanouilidis, C. Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications. Sensors 2021, 21, 3654. [Google Scholar] [CrossRef] [PubMed]
  3. Jung, G.; Ha, H.; Lee, S. Anomaly Detection of Facilities and Non-disruptive Operation of Smart Factory Using Kubernetes. J. Inf. Processing Syst. 2021, 17, 1071–1082. [Google Scholar]
  4. Wang, Y.; Che, T.; Zhao, X.; Zhou, T.; Zhang, K.; Hu, X. A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things. Sensors 2022, 22, 3426. [Google Scholar] [CrossRef]
  5. Wang, W.; Zhang, Y.; Gu, J.; Wang, J. A proactive manufacturing resources assignment method based on production performance prediction for the smart factory. IEEE Trans. Ind. Inform. 2021, 18, 46–55. [Google Scholar] [CrossRef]
  6. Mahmud, R.; Toosi, A.N.; Ramamohanarao, K.; Buyya, R. Context-aware placement of industry 4.0 applications in fog computing environments. IEEE Trans. Ind. Inform. 2019, 16, 7004–7013. [Google Scholar] [CrossRef]
  7. Abdel-Basset, M.; Chang, V.; Hawash, H.; Chakrabortty, R.K.; Ryan, M. Deep-IFS: Intrusion detection approach for industrial internet of things traffic in fog environment. IEEE Trans. Ind. Inform. 2020, 17, 7704–7715. [Google Scholar] [CrossRef]
  8. Wang, J.; Li, D.; Hu, Y. Fog nodes deployment based on space–time characteristics in smart factory. IEEE Trans. Ind. Inform. 2020, 17, 3534–3543. [Google Scholar] [CrossRef]
  9. Rad, M.M.; Rahmani, A.M.; Sahafi, A.; Qader, N.N. Social Internet of Things: Vision, challenges, and trends. Hum.-Cent. Comput. Inf. Sci. 2020, 10, 52. [Google Scholar]
  10. Lee, C.; Lim, C. From technological development to social advance: A review of Industry 4.0 through machine learning. Technol. Forecast. Soc. Chang. 2021, 167, 120653. [Google Scholar] [CrossRef]
  11. Esposito, C.; Ficco, M.; Gupta, B.B. Blockchain-based authentication and authorization for smart city applications. Inf. Processing Manag. 2021, 58, 102468. [Google Scholar] [CrossRef]
  12. Farahani, B.; Firouzi, F.; Luecking, M. The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions. J. Netw. Comput. Appl. 2021, 177, 102936. [Google Scholar] [CrossRef]
  13. Babun, L.; Denney, K.; Celik, Z.B.; McDaniel, P.; Uluagac, A.S. A survey on IoT platforms: Communication, security, and privacy perspectives. Comput. Netw. 2021, 192, 108040. [Google Scholar] [CrossRef]
  14. Da Xu, L.; Lu, Y.; Li, L. Embedding blockchain technology into IoT for security: A survey. IEEE Internet Things J. 2021, 8, 10452–10473. [Google Scholar]
  15. Qiao, H.; Novikov, B.; Blech, J.O. Concept Drift Analysis by Dynamic Residual Projection for effectively Detecting Botnet Cyber-attacks in IoT scenarios. IEEE Trans. Ind. Inform. 2021, 18, 3692–3701. [Google Scholar] [CrossRef]
  16. Ashraf, J.; Keshk, M.; Moustafa, N.; Abdel-Basset, M.; Khurshid, H.; Bakhshi, A.D.; Mostafa, R.R. IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities. Sustain. Cities Soc. 2021, 72, 103041. [Google Scholar] [CrossRef]
  17. Cui, Y.; Qian, Q.; Guo, C.; Shen, G.; Tian, Y.; Xing, H.; Yan, L. Towards DDoS detection mechanisms in software-defined networking. J. Netw. Comput. Appl. 2021, 190, 103156. [Google Scholar] [CrossRef]
  18. Cvitić, I.; Peraković, D.; Gupta, B.; Choo, K.K.R. Boosting-based DDoS detection in internet of things systems. IEEE Internet Things J. 2021, 9, 2109–2123. [Google Scholar] [CrossRef]
  19. Sicato, J.C.S.; Singh, S.K.; Rathore, S.; Park, J.H. A comprehensive analyses of intrusion detection system for IoT environment. J. Inf. Processing Syst. 2020, 16, 975–990. [Google Scholar]
  20. Zhou, X.; Xu, X.; Liang, W.; Zeng, Z.; Shimizu, S.; Yang, L.T.; Jin, Q. Intelligent small object detection for digital twin in smart manufacturing with industrial cyber-physical systems. IEEE Trans. Ind. Inform. 2021, 18, 1377–1386. [Google Scholar] [CrossRef]
  21. Hu, C.; Fan, W.; Zeng, E.; Hang, Z.; Wang, F.; Qi, L.; Bhuiyan, M.Z.A. Digital Twin-Assisted Real-Time Traffic Data Prediction Method for 5G-Enabled Internet of Vehicles. IEEE Trans. Ind. Inform. 2021, 18, 2811–2819. [Google Scholar] [CrossRef]
  22. Popoola, S.I.; Ande, R.; Adebisi, B.; Gui, G.; Hammoudeh, M.; Jogunola, O. Federated deep learning for zero-day botnet attack detection in IoT edge devices. IEEE Internet Things J. 2021, 9, 3930–3944. [Google Scholar] [CrossRef]
  23. Hussain, F.; Abbas, S.G.; Pires, I.M.; Tanveer, S.; Fayyaz, U.U.; Garcia, N.M.; Ghalib, A.S.; Shahzad, F. A Two-Fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks. IEEE Access 2021, 9, 163412–163430. [Google Scholar] [CrossRef]
  24. Trajanovski, T.; Zhang, N. An Automated and Comprehensive Framework for IoT Botnet Detection and Analysis (IoT-BDA). IEEE Access 2021, 9, 124360–124383. [Google Scholar] [CrossRef]
  25. Vinayakumar, R.; Alazab, M.; Srinivasan, S.; Pham, Q.V.; Padannayil, S.K.; Simran, K. A visualized botnet detection system based deep learning for the Internet of Things networks of smart cities. IEEE Trans. Ind. Appl. 2020, 56, 4436–4456. [Google Scholar] [CrossRef]
  26. Hayat, R.F.; Aurangzeb, S.; Aleem, M.; Srivastava, G.; Lin, J.C.W. ML-DDoS: A Blockchain-Based Multilevel DDoS Mitigation Mechanism for IoT Environments. IEEE Trans. Eng. Manag. 2022, 1–14. [Google Scholar] [CrossRef]
  27. Lekssays, A.; Landa, L.; Carminati, B.; Ferrari, E. PAutoBotCatcher: A blockchain-based privacy-preserving botnet detector for Internet of Things. Comput. Netw. 2021, 200, 108512. [Google Scholar] [CrossRef]
  28. Sun, S.; Du, R.; Chen, S.; Li, W. Blockchain-based IoT access control system: Towards security, lightweight, and cross-domain. IEEE Access 2021, 9, 36868–36878. [Google Scholar] [CrossRef]
  29. Xu, C.; Qu, Y.; Luan, T.H.; Eklund, P.W.; Xiang, Y.; Gao, L. A Light-weight and Attack-Proof Bidirectional Blockchain Paradigm for Internet of Things. IEEE Internet Things J. 2021, 9, 4371–4384. [Google Scholar] [CrossRef]
  30. Białczak, P.; Mazurczyk, W. Characterizing anomalies in malware-generated http traffic. Secur. Commun. Netw. 2020, 2020, 8848863. [Google Scholar] [CrossRef]
  31. Shah, Z.; Ullah, I.; Li, H.; Levula, A.; Khurshid, K. Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey. Sensors 2022, 22, 1094. [Google Scholar] [CrossRef] [PubMed]
  32. Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [Google Scholar] [CrossRef]
  33. Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Slay, J. Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques. In Proceedings of the International Conference on Mobile Networks and Management, Melbourne, Australia, 13 December 2017. [Google Scholar]
  34. Koroniotis, N.; Moustafa, N.; Sitnikova, E. A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework. Future Gener. Comput. Syst. 2020, 110, 91–106. [Google Scholar] [CrossRef]
  35. Koroniotis, N.; Moustafa, N. Enhancing network forensics with particle swarm and deep learning: The particle deep framework. arXiv 2020, arXiv:2005.00722. [Google Scholar]
  36. Koroniotis, N.; Moustafa, N.; Schiliro, F.; Gauravaram, P.; Janicke, H. A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports. IEEE Access 2020, 8, 209802–209834. [Google Scholar] [CrossRef]
  37. Koroniotis, N. Designing an Effective Network Forensic Framework for the Investigation of Botnets in the Internet of Things. Ph.D. Dissertation, The University of New South Wales, Kensington, Australia, 2020. [Google Scholar]
Figure 1. Blockchain-enabled Secure Digital Twin framework overview.
Figure 1. Blockchain-enabled Secure Digital Twin framework overview.
Sensors 22 06133 g001
Figure 2. Packet Auditor and Digital Twin registration.
Figure 2. Packet Auditor and Digital Twin registration.
Sensors 22 06133 g002
Figure 3. Digital Twin synchronization.
Figure 3. Digital Twin synchronization.
Sensors 22 06133 g003
Figure 4. (a) DT Synchronization with PT; (b) CPU utilization.
Figure 4. (a) DT Synchronization with PT; (b) CPU utilization.
Sensors 22 06133 g004
Figure 5. (a) PA packet analysis; (b) CPU utilization of PA.
Figure 5. (a) PA packet analysis; (b) CPU utilization of PA.
Sensors 22 06133 g005
Figure 6. Comparison with existing studies based on block transaction speed.
Figure 6. Comparison with existing studies based on block transaction speed.
Sensors 22 06133 g006
Figure 7. Comparison analysis of consensus algorithms to DDoS attacks.
Figure 7. Comparison analysis of consensus algorithms to DDoS attacks.
Sensors 22 06133 g007
Figure 8. Comparison analysis of accuracy in botnet detection with Popoola.
Figure 8. Comparison analysis of accuracy in botnet detection with Popoola.
Sensors 22 06133 g008
Table 1. Comparative Analysis of the proposed scheme with related research.
Table 1. Comparative Analysis of the proposed scheme with related research.
ReferencesMechanismData SecurityData IntegrityData PrivacyAvailabilityNon-Repudiation
Popoola et al. [22] (2021)Federated LearningModel is trained locally on devicesPoison attacks affect data integrityOnly local model gradients trained at the device are shared with the networkDevice availability is not addressed in this studyNon-repudiation is not addressed in this study
Hussain et al. [23] (2021)Dual Machine LearningData transmitted to centralized server is exposed to man-in-the-middle attacksMachine Learning models train using compromised dataData in transmission is exposed to man-in-the-middle attacksArithmetic operations are performed over an untrusted cloud server exposing computation processRecords of infected device are not maintained
Trajanovski et al. [24] (2021)HoneypotDelayed identification of compromised devices does not address data securityDelayed identification of compromised devices does not address data integrityDelayed identification of compromised devices does not address data privacyThe research does not address device availabilityRecords of infected device are not maintained
Vinayakumar et al. [25] (2020)Deep Learning using DNS QueryMan-in-the-middle attacks compromise data upload for model trainingMan-in-the-middle attacks transmit corrupt data in transmissionPseudo IDs preserve the privacy of usersThe research does not address device availability requirementRecords of infected device are not maintained
Hayat et al. [26] (2022)Machine Learning and BlockchainData is securely stored in BlockchainMalicious devices are preregistered in the Blockchain network, transmitting compromised data to the Machine Learning modelPrivacy of users are maintained by verifying identities at both the Edge and the cloud layer using dual signatures and identifiersMalicious devices are ejected from the networkThe study does not address recording of compromised devices.
Lekssays et al. [27] (2021)BlockchainData is securely stored in BlockchainBlockchain validates devices allowed to transmit dataPrivacy of data is not addressed in the studyThe study does not prevent spreading of botnet scriptThe study does not address recording of compromised devices
Sun et al. [28] (2021)Blockchain and EncryptionData storage in Blockchain prevents data manipulationPublic key-based authentication prevents corrupt data uploadThe study does not address Data PrivacyThe study does not prevent spreading of botnet scriptDevice information is stored in Blockchain for traceability
Xu et al. [29] (2021)Blockchain and Smart ContractsConsensus algorithm ensures stored data securityInfected IoT bots transmit data for anomaly detectionSecret keys provided to authorized members access data.The study does not prevent spreading of botnet scriptDevice information is stored in Blockchain for traceability
Proposed schemeDigital Twin and BlockchainAuthorized and registered Digital Twins share dataSynchronization between the Digital Twin and Packet Auditor verifies data transmissionInspection of Packet Headers enables inspection of encrypted IP packetsCertificate revocation of Digital Twins prevents Botnet from spreadingIP address of infected devices are stored in the Blockchain
Table 2. Notation table for abbreviations used in the framework.
Table 2. Notation table for abbreviations used in the framework.
No.TermDescription
1.DTDigital Twin
2. D T 1 Production Floor Digital Twin
3. D T 2 Raw Material Management Digital Twin
4. D T 3 Assembly Line Digital Twin
5. D T 4 Packaging and Warehousing Digital Twin
6.HTTPSHypertext Transfer Protocol Secure
7.SSLSecure Socket Layer
9.UDPUser Datagram Protocol
10.IPInternet Protocol
11.PAPacket Auditor
12. P A I D Packet Auditor ID
13. T x n Transaction
14. C e r t D T Digital Twin Certificate
15. P P u b K Packet Auditor Public Key
16. P P r v K Packet Auditor Private Key
17. D T p u b K Digital Twin Public Key
18. D T p r v K Digital Twin Private Key
19. P r o f D T Digital Twin Profile
20. D I D Device ID
21. I P s r c n IP Packet Source
22. I P d s t n IP Packet Destination
23. t s t m p n Timestamp of captured packet
24. b d u p p e r Upper Time Boundary
25. b d l o w e r Lower Time Boundary
26. P T Physical Twin
27.DLDeep Learning
28.ACKAcknowledgement Packet
29.SYNSynchronize Packet
30.C&CCommand and Control
31.LSTMLong-Short-Term Memory
Table 3. Analysis of DT PT Synchronization Latency.
Table 3. Analysis of DT PT Synchronization Latency.
ParametersModels100020003000400050006000
Latency (ms)PT6.8446.8456.8536.8686.8756.882
DT6.8466.8476.8566.8706.8776.884
Table 4. Analysis of DT PT Synchronization CPU consumption.
Table 4. Analysis of DT PT Synchronization CPU consumption.
ParametersTime (ms)50010001500200025003000350040004500500055006000
CPU Consumption (%)PT19.7422.6523.6724.3426.4229.7631.5433.7835.7037.8942.5545.22
DT19.0022.0023.0024.0026.0029.0031.0033.0035.0037.4341.7744.65
Table 5. Analysis of P r o f D T in Latency and CPU consumption.
Table 5. Analysis of P r o f D T in Latency and CPU consumption.
ParametersModels12345678
Latency (s)Baseline model2.0782.2052.4272.6472.7382.8863.1173.428
Proposed Framework2.12.212.432.652.742.893.123.43
CPU Consumption (%)Baseline model22232526.627.9293133
Proposed Framework151717.61921222527
Table 6. Quantitative Analysis of the Botnet-detection model with existing research.
Table 6. Quantitative Analysis of the Botnet-detection model with existing research.
ModelsAccuracyPrecisionRecallF1 Score
Proposed model99.9799.3297.5498.11
Popoola et al. [22]99.9399.0896.9797.96
Hussain et al. [23]98.8598.9598.6698.81
Vinayakumar et al. [25]89.9093.9490.591.9
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Salim, M.M.; Comivi, A.K.; Nurbek, T.; Park, H.; Park, J.H. A Blockchain-Enabled Secure Digital Twin Framework for Early Botnet Detection in IIoT Environment. Sensors 2022, 22, 6133. https://doi.org/10.3390/s22166133

AMA Style

Salim MM, Comivi AK, Nurbek T, Park H, Park JH. A Blockchain-Enabled Secure Digital Twin Framework for Early Botnet Detection in IIoT Environment. Sensors. 2022; 22(16):6133. https://doi.org/10.3390/s22166133

Chicago/Turabian Style

Salim, Mikail Mohammed, Alowonou Kowovi Comivi, Tojimurotov Nurbek, Heejae Park, and Jong Hyuk Park. 2022. "A Blockchain-Enabled Secure Digital Twin Framework for Early Botnet Detection in IIoT Environment" Sensors 22, no. 16: 6133. https://doi.org/10.3390/s22166133

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop