System Component-Level Self-Adaptations for Security via Bayesian Games

  title={System Component-Level Self-Adaptations for Security via Bayesian Games},
  author={Mingyue Zhang},
  journal={2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)},
  • Mingyue Zhang
  • Published 12 March 2021
  • Computer Science
  • 2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)
Security attacks present unique challenges to self-adaptive system design due to the adversarial nature of the environment. However, modeling the system as a single player, as done in prior works in security domain, is insufficient for the system under partial compromise and for the design of fine-grained defensive strategies where the rest of the system with autonomy can cooperate to mitigate the impact of attacks. To deal with such issues, we propose a new self-adaptive framework… 
1 Citations

Figures from this paper

A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems

An approach for securing software-intensive systems using a rigorous game-theoretical framework and systematically presents a case study on a real-world water treatment testbed, i.e. the Secure Water Treatment System.



Modeling observability in adaptive systems to defend against advanced persistent threats

This work proposes a model of APT defense that elevates observability as a first-class concern, and shows how an informed approach that uses observability improves the defender's utility compared to a uniform random strategy, can enable robust planning through sensitivity analysis, and can inform observability-related architectural design decisions.

FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage

This work follows a game-theoretic approach and proposes a model titled FlipLeakage, where an attacker will incrementally and stealthily take ownership of a resource e.g., similar to advanced persistent threats.

Analyzing Self-Adaptation Via Model Checking of Stochastic Games

This chapter describes an approach based on model checking of stochastic multiplayer games that enables developers to approximate the behavioral envelope of a self-adaptive system by analyzing best- and worst-case scenarios of alternative designs for self- Adaptation mechanisms.

Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned

This book is claimed to be the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the U.S. Federal Air Marshals Service.

A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats

A dynamic information flow tracking game for resource-efficient detection of APTs via multistage dynamic games that first calculates the best responses of the players and then compute Nash equilibrium for single-stage attacks, and provides a polynomial-time algorithm to compute a correlated equilibrium for the multistages attack case.

Game Theory for Cyber Security and Privacy

This survey demonstrates how to employ game-theoretic approaches to security and privacy but also encourages researchers to employgame theory to establish a comprehensive understanding of emergingSecurity and privacy problems in cyberspace and potential solutions.

Analyzing Latency-Aware Self-Adaptation Using Stochastic Games and Simulations

A novel approach to choosing adaptations that considers latencies, and shows that latency awareness improves adaptation outcomes and also allows a larger set of adaptations to be exploited.

Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences

This paper proposes smart fuzzing, an automated, machine learning guided technique for systematically finding 'test suites' of CPS network attacks, without requiring any knowledge of the system's control programs or physical processes.

A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

A taxonomy is proposed that defines six types of deception: perturbation, moving target defense, obfuscation, mixing, honey-x, and attacker engagement and provides a systematic foundation for understanding different types of defensive deception commonly encountered in cybersecurity and privacy.

A Survey of Approaches to Adaptive Application Security

  • Ahmed M. ElkhodaryJ. Whittle
  • Computer Science
    International Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS '07)
  • 2007
This paper surveys four adaptive application-level security systems and evaluates them in terms of how well they support critical security services and what level of adaptation they achieve and provides recommendations for future research.