Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published April 11, 2019 | Version v1
Journal article Open

An abstraction layer for cybersecurity context

  • 1. CNIT

Description

The growing complexity and diversification of cyber-attacks are largely reflected in the increasing sophistication of security appliances, which are often too cumbersome to be run in virtual services and IoT devices. Hence, the design of cyber-security frameworks is today looking at more cooperative models, which collect security-related data from a large set of heterogeneous sources for centralized analysis and correlation.In this paper, we outline a flexible abstraction layer for access to security context. It is conceived to program and gather data from lightweight inspection and enforcement hooks deployed in cloud applications and IoT devices. We also provide a preliminary description of its implementation, by reviewing the main software components and their role.

Files

icnc19.pdf

Files (275.5 kB)

Name Size Download all
md5:011996dd4c0632f134864e0a91250b63
275.5 kB Preview Download

Additional details

Funding

ASTRID – AddreSsing ThReats for virtualIseD services 786922
European Commission