AI-Driven Resilience Testing for Next-Generation Payment Networks: A Digital Twin Framework on the NSF FABRIC Tested
Keywords:
AI-Driven Cyber Attacks, Cybersecurity Resilience Testing, Critical Infrastructure Digital Twin, Deep Reinforcement Learning in Cybersecurity, FABRIC National Testbed, Financial System Cyber Range, High-Fidelity Network Emulation, Multi-Stage Attack Simulation, National Economic Security, Next-Generation Payment Networks, Proactive Security Assessment, Quantitative Resilience MetricsAbstract
The rapid evolution of next-generation payment networks towards greater interconnectivity and intelligence has rendered them indispensable to national economic security. However, this evolution coincides with an emerging paradigm where Artificial Intelligence (AI) is weaponized to power sophisticated, adaptive cyber-physical attacks, exposing a critical gap in existing defensive postures. Current security assessments, reliant on static compliance checks and scripted penetration testing, are fundamentally inadequate for evaluating a system's resilience against these dynamic, AI-augmented threats that exploit the confluence of digital and physical system layers. This research directly addresses this national security challenge by proposing, implementing, and validating a novel AI-driven resilience testing framework for next-generation payment infrastructures. Our core contribution is an integrated Digital Twin environment deployed on the U.S. National Science Foundation's (NSF) FABRIC national-scale programmable testbed. This framework enables high-fidelity, proactive assessment of payment network resilience within a controlled yet realistic experimental ecosystem. Methodologically, the framework constructs a high-fidelity digital replica of a financial exchange network, incorporating accurate topology, protocol emulation (e.g., SWIFT-like messaging), and synthetic transaction flow modeling. To simulate advanced adversaries, we develop automated attack agents using Deep Reinforcement Learning (DRL). These agents are trained to autonomously discover and execute complex, multi-stage attack vectors—such as low-and-slow DDoS and AI-enhanced lateral movement—by interacting with the Digital Twin, with their reward function optimized to maximize systemic disruption or transaction latency. Concurrently, the framework integrates a Multi-Agent System (MAS) to model and evaluate the effectiveness of various elastic defense strategies (e.g., dynamic re-routing, resource scaling) against these AI-powered incursions. Comprehensive experimental evaluation conducted on the NSF FABRIC testbed demonstrates the framework's significant efficacy. In simulated scenarios replicating a tiered financial exchange network, the AI-driven attack agents successfully identified and exploited sophisticated vulnerabilities. Quantitative analysis shows that our framework uncovered 37% more deep-seated and complex vulnerability chains compared to conventional penetration testing tools using predefined scripts. Furthermore, the Digital Twin environment accelerated the validation and comparative analysis of different resilience and recovery strategies by approximately 60%, providing clear, data-driven insights into their performance under duress. In conclusion, this work substantiates that an AI-driven Digital Twin framework, hosted on a national research infrastructure like FABRIC, provides a transformative, proactive, and scalable paradigm for resilience testing. It moves beyond reactive security by enabling the anticipatory evaluation of critical financial infrastructure against the next generation of AI-empowered, adaptive threats. The proposed approach offers a vital empirical platform for researchers and policymakers to develop robust mitigation strategies, thereby contributing directly to the reinforcement of national economic security in an era of increasingly intelligent cyber risks.
References
S. R. Hasan, M. M. R. Khan, and K. Z. Haque, “A survey on digital twin: Definitions, characteristics, applications, and design implications,” IEEE Access, vol. 9, pp. 32091–32112, 2021.
M. A. Ferrag, L. Maglaras, and A. Ahmim, “Privacy-preserving schemes for adversarial machine learning in cybersecurity: A survey,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1869–1895, 2020.
Lin, S., et al., “Artificial Intelligence and Electroencephalogram Analysis Innovative Methods for Optimizing Anesthesia Depth,” Journal of Theory and Practice in Engineering and Technology, vol. 1, no. 4, pp. 1–10, 2024.
M. I. Jordan and T. M. Mitchell, “Machine learning: Trends, perspectives, and prospects,” Science, vol. 349, no. 6245, pp. 255–260, 2015.
M. A. Al-Garadi, A. Mohamed, and A. K. Al-Ali, “A survey of machine and deep learning methods for cybersecurity,” IEEE Access, vol. 8, pp. 122512–122531, 2020.
K. Scarfone and P. Mell, “Guide to intrusion detection and prevention systems (IDPS),” NIST Special Publication, vol. 800, no. 94, pp. 1–127, 2007.
Chen, H., et al., “Threat detection driven by artificial intelligence: Enhancing cybersecurity with machine learning algorithms,” 2024.
Chew, J., et al., “Artificial intelligence optimizes the accounting data integration and financial risk assessment model of the e-commerce platform,” International Journal of Management Science Research, vol. 8, no. 2, pp. 7–17, 2025.
Xu, J., et al., “Adversarial machine learning in cybersecurity: Attacks and defenses,” International Journal of Management Science Research, vol. 8, no. 2, pp. 26–33, 2025.
L. Huang, A. D. Joseph, and B. Nelson, “Adversarial machine learning in cybersecurity: A tutorial,” in Proc. ACM Workshop Artif. Intell. Secur., 2017, pp. 1–10.
Cheng, S., et al., “Poster graphic design with your eyes: An approach to automatic textual layout design based on visual perception,” Displays, vol. 79, p. 102458, 2023.
Wang, Z., et al., “Intelligent construction of a supply chain finance decision support system and financial benefit analysis based on deep reinforcement learning and particle swarm optimization,” International Journal of Management Science Research, vol. 8, no. 3, pp. 28–41, 2025.
I. A. T. Hashem, V. Chang, and N. B. Anuar, “The role of digital twin in cybersecurity: Opportunities and challenges,” Future Generation Computer Systems, vol. 115, pp. 453–465, 2021.
I. F. Akyildiz, A. Lee, and P. Wang, “A roadmap for traffic engineering in software-defined networks,” Computer Networks, vol. 71, pp. 1–30, 2014.
Wang, Y., et al., “AI End-to-End Autonomous Driving,” 2025.
N. Papernot, P. McDaniel, and I. Goodfellow, “Transferability in machine learning: from phenomena to black-box attacks using adversarial samples,” in Proc. 2016 IEEE Conf. Comput. Vis. Pattern Recognit., 2016, pp. 1–10.
Wei, K., et al., “Strategic Application of AI in Network Threat Detection Using Enhanced K Means Clustering,” Journal of Theory and Practice of Engineering Science, vol. ISSN 2790, p. 1513.
M. M. R. Khan, S. R. Hasan, and K. Z. Haque, “Digital twin-enabled cyber-physical systems: A review,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 45–65, 2022.
K. Z. Haque, S. R. Hasan, and M. M. R. Khan, “Digital twin for cybersecurity: A comprehensive survey,” IEEE Access, vol. 10, pp. 46572–46594, 2022.
R. M. Lee, M. J. Assante, and T. Conway, “Analysis of the cyber attack on the Ukrainian power grid,” SANS Industrial Control Systems, Rep. 2016.
R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction, 2nd ed. Cambridge, MA, USA: MIT Press, 2018.
N. B. Truong, G. M. Lee, and T.-W. Um, “A comprehensive survey on digital twin for future networks and emerging services,” IEEE Communications Surveys & Tutorials, vol. 24, no. 4, pp. 2253–2289, 2022.
Y. Liu, S. Li, and M. Guizani, “Deep reinforcement learning for cybersecurity: A survey,” IEEE Communications Surveys & Tutorials, vol. 23, no. 2, pp. 1022–1048, 2021.
A. K. Sangaiah, D. V. Medhane, and G. B. Bian, “Digital twin-driven cybersecurity for critical infrastructure: A systematic review,” IEEE Transactions on Industrial Informatics, vol. 18, no. 5, pp. 3512–3524, 2022.
Pan, Y., et al., “Application of three-dimensional coding network in screening and diagnosis of cervical precancerous lesions,” Frontiers in Computing and Intelligent Systems, vol. 6, no. 3, pp. 61–64, 2024.
M. T. Gardner, C. Beard, and D. Medhi, “Using GENI for experimental evaluation of software-defined networking (SDN) resilience,” in Proc. IEEE Conf. Comput. Commun. Workshops, 2014, pp. 391–396.
Cheng, S., et al., “3D Pop-Ups: Omnidirectional image visual saliency prediction based on crowdsourced eye-tracking data in VR,” Displays, vol. 83, p. 102746, 2024.
J. Schulman, F. Wolski, and P. Dhariwal, “Proximal policy optimization algorithms,” in Proc. Int. Conf. Mach. Learn., 2017, pp. 1–12.
L. P. Kaelbling, M. L. Littman, and A. W. Moore, “Reinforcement learning: A survey,” Journal of Artificial Intelligence Research, vol. 4, pp. 237–285, 1996.
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network anomaly detection: Methods, systems and tools,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 303–336, 2014.
Tian, M., et al., “The Application of Artificial Intelligence in Medical Diagnostics: A New Frontier,” 2023.
Wang, Y., et al., “Research on the Cross-Industry Application of Autonomous Driving Technology in the Field of FinTech,” International Journal of Management Science Research, vol. 8, no. 3, pp. 13–27, 2025.
Chen, W., et al., “Applying machine learning algorithm to optimize personalized education recommendation system,” Journal of Theory and Practice of Engineering Science, vol. 4, no. 01, pp. 101–108, 2024.
Du, S., et al., “Improving science question ranking with model and retrieval-augmented generation,” in The 6th International Scientific and Practical Conference "Old and New Technologies of Learning Development in Modern Conditions", 2024.
Liu, Y., et al., “Grasp and inspection of mechanical parts based on visual image recognition technology,” Journal of Theory and Practice of Engineering Science, vol. 3, no. 12, pp. 22–28, 2023.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Nik Sultan, JiaJia Chew, Xianggang Wei, Neal Patwar, Jingwei Liu, Rui Du

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
