System Component-Level Self-Adaptations for Security via Bayesian Games

Security attacks present unique challenges to self-adaptive system design due to the adversarial nature of the environment. However, modeling the system as a single player, as done in prior works in security domain, is insufficient for the system under partial compromise and for the design of fine-g...

Full description

Saved in:
Bibliographic Details
Published in:2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) pp. 102 - 104
Main Author: Zhang, Mingyue
Format: Conference Proceeding
Language:English
Published: IEEE 01.05.2021
Subjects:
ISBN:1665412194, 9781665412193
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Security attacks present unique challenges to self-adaptive system design due to the adversarial nature of the environment. However, modeling the system as a single player, as done in prior works in security domain, is insufficient for the system under partial compromise and for the design of fine-grained defensive strategies where the rest of the system with autonomy can cooperate to mitigate the impact of attacks. To deal with such issues, we propose a new self-adaptive framework incorporating Bayesian game and model the defender (i.e., the system) at the granularity of components in system architecture. The system architecture model is translated into a Bayesian multi-player game, where each component is modeled as an independent player while security attacks are encoded as variant types for the components. The defensive strategy for the system is dynamically computed by solving the pure equilibrium to achieve the best possible system utility, improving the resiliency of the system against security attacks.
AbstractList Security attacks present unique challenges to self-adaptive system design due to the adversarial nature of the environment. However, modeling the system as a single player, as done in prior works in security domain, is insufficient for the system under partial compromise and for the design of fine-grained defensive strategies where the rest of the system with autonomy can cooperate to mitigate the impact of attacks. To deal with such issues, we propose a new self-adaptive framework incorporating Bayesian game and model the defender (i.e., the system) at the granularity of components in system architecture. The system architecture model is translated into a Bayesian multi-player game, where each component is modeled as an independent player while security attacks are encoded as variant types for the components. The defensive strategy for the system is dynamically computed by solving the pure equilibrium to achieve the best possible system utility, improving the resiliency of the system against security attacks.
Author Zhang, Mingyue
Author_xml – sequence: 1
  givenname: Mingyue
  surname: Zhang
  fullname: Zhang, Mingyue
  email: mingyuezhang@pku.edu.cn
  organization: Peking University, China
BookMark eNotjktLw0AURgdU0Nb-AjdZuUu888o4yxpqWgi4iK7LzeQODORRMrGQf29EVx8cOIdvw26HcSDGnjlknIN9ORX1IS3G_oJDGActctCZAMEzAFDmhm14nmvFBbfqnu1iDA0oZeyqmgdW1kucqU9-_TU7zGlFV-qSmjqf7lu8zDiv1Zj4cVqh-57CvCTXgMkbLhQDDkmJPcVHduexi7T73y37ej98Fse0-ihPxb5KUYKeUxKglSHfttxpBHSvOfkGV7QedlIJBMfRGp87KYwGhJaTBhIml842Xm7Z0183ENH5MoUep-VsFQhprPwB60BQvQ
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICSE-Companion52605.2021.00047
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EndPage 104
ExternalDocumentID 9402379
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  funderid: 10.13039/501100001809
GroupedDBID 6IE
6IF
6IL
6IN
AAWTH
ABLEC
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-a305t-e20547efdd1c5a0ac86efba47e021c342a0c1a97f6c32750a0d1e50e2763c9bf3
IEDL.DBID RIE
ISBN 1665412194
9781665412193
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000706450400027&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 02:50:24 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a305t-e20547efdd1c5a0ac86efba47e021c342a0c1a97f6c32750a0d1e50e2763c9bf3
PageCount 3
ParticipantIDs ieee_primary_9402379
PublicationCentury 2000
PublicationDate 2021-May
PublicationDateYYYYMMDD 2021-05-01
PublicationDate_xml – month: 05
  year: 2021
  text: 2021-May
PublicationDecade 2020
PublicationTitle 2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)
PublicationTitleAbbrev ICSE-COMPANION
PublicationYear 2021
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib044791097
Score 2.171559
Snippet Security attacks present unique challenges to self-adaptive system design due to the adversarial nature of the environment. However, modeling the system as a...
SourceID ieee
SourceType Publisher
StartPage 102
SubjectTerms Bayes methods
Bayesian game
Computational modeling
Games
Security
Self-adaptation
Software engineering
System analysis and design
Systems architecture
Title System Component-Level Self-Adaptations for Security via Bayesian Games
URI https://ieeexplore.ieee.org/document/9402379
WOSCitedRecordID wos000706450400027&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA5tEfGk0opvchBPxu4m6WZz1NJWQUqhCr2VPGahIG1ptwX_vZPdbUXw4i0JLMwkmc2XzMw3hNwlggsjQbGMW8WkAsk0WM0SIbCNEMEoWxSbUMNhOpnoUY087HNhAKAIPoPH0Cx8-X7hNuGprK3xsiOUrpO6UkmZq7XbO1IqHZypIXcrFNSN0RJlRem064tDcl9xbLZfu-MeK00O9e8EVI-XRR4X7J2_S60UJ03_-H8ynpDWT8oeHe0Po1NSg3mTDEo-chokWMzxO_YWYoToGD4z9uTNsvTDrykiVzquKtnR7czQZ_MFIb2SDkIUbYt89Hvv3RdWVU5gBu03Z8ARiSnIvI9dx0TGpQlk1uAQquiE5CZysdEqS5wIBO8m8jF0IuD4t3HaZuKMNOYo1zmh2htrrTIOsYHkPrWAGMwanvpYA67yBWmGSZguS3KMaaX_5d_DV-QozHIZMXhNGvlqAzfkwG3z2Xp1W6zoN2XNnpg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA61inpSacW3OYgnY7vJdrM5aukLaym0Qm8lj1koSFv6Av-9k91tRfDiLRtYmDxm82Vn5vsIeYgEFzoEyRJuJAslhEyBUSwSAtsIEbQ0qdiE7PXi0Uj1C-RpVwsDAGnyGTz7ZhrLdzO79r_KKgovO0KqPbLvlbPyaq3t7glDqXw41VdveUndAH0xzEmdts_ikDzmLJuVTn3QYJnT4QzUPK7H6yIPUv7O32Ir6VnTPPmflaek_FO0R_u74-iMFGBaIq2MkZx6C2ZTfI91fZYQHcBnwl6cnmeR-CVF7EoHuZYd3Uw0fdVf4Assacvn0ZbJR7MxrLdZrp3ANHrwigFHLCYhcS6wNV3VNo4gMRq7cIhWhFxXbaCVTCIrPMW7rroAalXg-L2xyiTinBSnaNcFocppY4zUFtFByF1sAFGY0Tx2gQJc50tS8pMwnmf0GON8_Fd_d9-To_bwvTvudnpv1-TYz3iWP3hDiqvFGm7Jgd2sJsvFXbq639wqoeE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2021+IEEE%2FACM+43rd+International+Conference+on+Software+Engineering%3A+Companion+Proceedings+%28ICSE-Companion%29&rft.atitle=System+Component-Level+Self-Adaptations+for+Security+via+Bayesian+Games&rft.au=Zhang%2C+Mingyue&rft.date=2021-05-01&rft.pub=IEEE&rft.isbn=9781665412193&rft.spage=102&rft.epage=104&rft_id=info:doi/10.1109%2FICSE-Companion52605.2021.00047&rft.externalDocID=9402379
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781665412193/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781665412193/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781665412193/sc.gif&client=summon&freeimage=true