SHARE
Facebook X Pinterest WhatsApp

Digital Twins Offer a Whole New Layer of Security, Study Suggests

thumbnail
Digital Twins Offer a Whole New Layer of Security, Study Suggests

Hannover, Germany - April, 2018: Simulating of car manufacturing by robots, digital twin of the production on Siemens stand on Messe fair in Hannover, Germany

A new and improved strategy for detecting cyberattacks on manufacturing systems involves using AI to monitor a digital twin that mimics and is fed real-time data from the physical system.

Written By
thumbnail
Joe McKendrick
Joe McKendrick
Apr 10, 2023

Cybersecurity has long been a cat-and-mouse game between enterprises and hackers — or, more benignly, between enterprises and the mistakes their own people tend to make. Now, there is potential for essential operations and data to be separated from vulnerable surfaces, through digital twins technology.

That’s the word from the National Institute of Standards, which highlights a paper published in IEEE Transactions on Automation Science and Engineering, in which NIST and University of Michigan researchers demonstrated the feasibility of a digital-twin cybersecurity strategy by detecting cyberattacks aimed at a 3D printer in their lab. This is a framework that is applicable to could be applied to a broad range of commercial settings, and invokes new analytic capabilities. “A new and improved strategy for detecting cyberattacks on manufacturing systems, such as 3D printers, involves using AI to monitor a digital twin that mimics and is fed real-time data from the physical system,” according to the NIST authors.

Employing digital twin technology to sense abnormalities or intrusions has long been hampred by the impact that detecting cyberattacks has had the impact on system performance. Systems may need to be shut down to enable tools or administrators to probe for security information. “Operational data describing what is occurring within machines — sensor data, error signals, digital commands being issued or executed, for instance — could support cyberattack detection.,” according to the NIST paper. “However, directly accessing this kind of data in near real time from operational technology devices, such as a 3D printer, could put the performance and safety of the process on the factory floor at risk.”

Security data is inherent within digital twin platforms. Typically, they incorporate “an abundance of operational data, helping them accomplish a variety of feats without impacting performance or safety, including predicting when parts will start to break down and require maintenance,” the NIST authors relate. “In addition to spotting routine indicators of wear and tear, digital twins could help find something more within manufacturing data.”

See also: Digital Twins Open the Gates of Collaboration

“Because manufacturing processes produce such rich data sets — temperature, voltage, current — and they are so repetitive, there are opportunities to detect anomalies that stick out, including cyberattacks,” said Dawn Tilbury, a professor of mechanical engineering at the University of Michigan and study co-author. 

In Tilbury’s demonstration project, the models incorporated into the digital twin “were adept at recognizing what the printer looked like under normal conditions, also meaning they could tell when things were out of the ordinary. If these models detected an irregularity, they passed the baton off to other computer models that checked whether the strange signals were consistent with anything in a library of known issues, such as the printer’s fan cooling its printing head more than expected. Then the system categorized the irregularity as an expected anomaly or a potential cyber threat.” A human expert made the final call as to whether the security threat was valid.

“If the framework hasn’t seen a certain anomaly before, a subject matter expert can analyze the collected data to provide further insights to be integrated into and improve the system,” said lead-author Efe Balta, a postdoctoral researcher at ETH Zurich. In the process, the model would learn what constitutes potential cybersecurity threats.

thumbnail
Joe McKendrick

Joe McKendrick is RTInsights Industry Editor and industry analyst focusing on artificial intelligence, digital, cloud and Big Data topics. His work also appears in Forbes an Harvard Business Review. Over the last three years, he served as co-chair for the AI Summit in New York, as well as on the organizing committee for IEEE's International Conferences on Edge Computing. (full bio). Follow him on Twitter @joemckendrick.

Recommended for you...

The Rise of Autonomous BI: How AI Agents Are Transforming Data Discovery and Analysis
Beyond Procurement: Optimizing Productivity, Consumer Experience with a Holistic Tech Management Strategy
Rishi Kohli
Jan 3, 2026
Smart Governance in the Age of Self-Service BI: Striking the Right Balance
Why the Next Evolution in the C-Suite Is a Chief Data, Analytics, and AI Officer

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.