Cargando…
Engineering Secure Self-Adaptive Systems with Bayesian Games
Security attacks present unique challenges to self-adaptive system design due to the adversarial nature of the environment. Game theory approaches have been explored in security to model malicious behaviors and design reliable defense for the system in a mathematically grounded manner. However, mode...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7978712/ http://dx.doi.org/10.1007/978-3-030-71500-7_7 |
_version_ | 1783667222813605888 |
---|---|
author | Li, Nianyu Zhang, Mingyue Kang, Eunsuk Garlan, David |
author_facet | Li, Nianyu Zhang, Mingyue Kang, Eunsuk Garlan, David |
author_sort | Li, Nianyu |
collection | PubMed |
description | Security attacks present unique challenges to self-adaptive system design due to the adversarial nature of the environment. Game theory approaches have been explored in security to model malicious behaviors and design reliable defense for the system in a mathematically grounded manner. However, modeling the system as a single player, as done in prior works, is insufficient for the system under partial compromise and for the design of fine-grained defensive strategies where the rest of the system with autonomy can cooperate to mitigate the impact of attacks. To deal with such issues, we propose a new self-adaptive framework incorporating Bayesian game theory and model the defender (i.e., the system) at the granularity of components. Under security attacks, the architecture model of the system is translated into a Bayesian multi-player game, where each component is explicitly modeled as an independent player while security attacks are encoded as variant types for the components. The optimal defensive strategy for the system is dynamically computed by solving the pure equilibrium (i.e., adaptation response) to achieve the best possible system utility, improving the resiliency of the system against security attacks. We illustrate our approach using an example involving load balancing and a case study on inter-domain routing. |
format | Online Article Text |
id | pubmed-7978712 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
record_format | MEDLINE/PubMed |
spelling | pubmed-79787122021-03-23 Engineering Secure Self-Adaptive Systems with Bayesian Games Li, Nianyu Zhang, Mingyue Kang, Eunsuk Garlan, David Fundamental Approaches to Software Engineering Article Security attacks present unique challenges to self-adaptive system design due to the adversarial nature of the environment. Game theory approaches have been explored in security to model malicious behaviors and design reliable defense for the system in a mathematically grounded manner. However, modeling the system as a single player, as done in prior works, is insufficient for the system under partial compromise and for the design of fine-grained defensive strategies where the rest of the system with autonomy can cooperate to mitigate the impact of attacks. To deal with such issues, we propose a new self-adaptive framework incorporating Bayesian game theory and model the defender (i.e., the system) at the granularity of components. Under security attacks, the architecture model of the system is translated into a Bayesian multi-player game, where each component is explicitly modeled as an independent player while security attacks are encoded as variant types for the components. The optimal defensive strategy for the system is dynamically computed by solving the pure equilibrium (i.e., adaptation response) to achieve the best possible system utility, improving the resiliency of the system against security attacks. We illustrate our approach using an example involving load balancing and a case study on inter-domain routing. 2021-02-24 /pmc/articles/PMC7978712/ http://dx.doi.org/10.1007/978-3-030-71500-7_7 Text en © The Author(s) 2021 Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. |
spellingShingle | Article Li, Nianyu Zhang, Mingyue Kang, Eunsuk Garlan, David Engineering Secure Self-Adaptive Systems with Bayesian Games |
title | Engineering Secure Self-Adaptive Systems with Bayesian Games |
title_full | Engineering Secure Self-Adaptive Systems with Bayesian Games |
title_fullStr | Engineering Secure Self-Adaptive Systems with Bayesian Games |
title_full_unstemmed | Engineering Secure Self-Adaptive Systems with Bayesian Games |
title_short | Engineering Secure Self-Adaptive Systems with Bayesian Games |
title_sort | engineering secure self-adaptive systems with bayesian games |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7978712/ http://dx.doi.org/10.1007/978-3-030-71500-7_7 |
work_keys_str_mv | AT linianyu engineeringsecureselfadaptivesystemswithbayesiangames AT zhangmingyue engineeringsecureselfadaptivesystemswithbayesiangames AT kangeunsuk engineeringsecureselfadaptivesystemswithbayesiangames AT garlandavid engineeringsecureselfadaptivesystemswithbayesiangames |