A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems

12/12/2021
by   Mingyue Zhang, et al.
0

The increasing prevalence of security attacks on software-intensive systems calls for new, effective methods for detecting and responding to these attacks. As one promising approach, game theory provides analytical tools for modeling the interaction between the system and the adversarial environment and designing reliable defense. In this paper, we propose an approach for securing software-intensive systems using a rigorous game-theoretical framework. First, a self-adaptation framework is deployed on a component-based software intensive system, which periodically monitors the system for anomalous behaviors. A learning-based method is proposed to detect possible on-going attacks on the system components and predict potential threats to components. Then, an algorithm is designed to automatically build a Bayesian game based on the system architecture (of which some components might have been compromised) once an attack is detected, in which the system components are modeled as independent players in the game. Finally, an optimal defensive policy is computed by solving the Bayesian game to achieve the best system utility, which amounts to minimizing the impact of the attack. We conduct two sets of experiments on two general benchmark tasks for security domain. Moreover, we systematically present a case study on a real-world water treatment testbed, i.e. the Secure Water Treatment System. Experiment results show the applicability and the effectiveness of our approach.

READ FULL TEXT
research
03/12/2021

System Component-Level Self-Adaptations for Security via Bayesian Games

Security attacks present unique challenges to self-adaptive system desig...
research
10/13/2022

A Game Theoretical vulnerability analysis of Adversarial Attack

In recent times deep learning has been widely used for automating variou...
research
09/13/2018

Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems

A hackfest named SWaT Security Showdown (S3) has been organized consecut...
research
02/27/2019

Attack-Defense Quantification Based On Game-Theory

With the developing of the attack and defense technology, the cyber envi...
research
01/03/2019

Towards Thwarting Social Engineering Attacks

Social engineering attacks represent an increasingly important attack ve...
research
03/05/2019

Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs

Recent developments have made autonomous vehicles (AVs) closer to hittin...
research
08/12/2015

A Game of Attribute Decomposition for Software Architecture Design

Attribute-driven software architecture design aims to provide decision s...

Please sign up or login with your details

Forgot password? Click here to reset