Conference paper Open Access

Data Log Management for Cyber-Security Programmability of Cloud Services and Applications

Carrega, Alessandro; Repetto, Matteo


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="URL">https://zenodo.org/record/3813158</identifier>
  <creators>
    <creator>
      <creatorName>Carrega, Alessandro</creatorName>
      <givenName>Alessandro</givenName>
      <familyName>Carrega</familyName>
      <affiliation>CNIT</affiliation>
    </creator>
    <creator>
      <creatorName>Repetto, Matteo</creatorName>
      <givenName>Matteo</givenName>
      <familyName>Repetto</familyName>
      <nameIdentifier nameIdentifierScheme="ORCID" schemeURI="http://orcid.org/">0000-0001-8478-2633</nameIdentifier>
      <affiliation>CNIT</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Data Log Management for Cyber-Security Programmability of Cloud Services and Applications</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2019</publicationYear>
  <dates>
    <date dateType="Issued">2019-11-15</date>
  </dates>
  <resourceType resourceTypeGeneral="Text">Conference paper</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/3813158</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.1145/3338511.3357351</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/guard-project</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;In last years, the security appliance is becoming a more important and critical challenge considering the growing complexity and diversification of cyber-attacks. The current solutions are often too cumbersome to be run in virtual services and Internet of Things (IoT) devices. Therefore, it is neces- sary to evolve to a more cooperative models, which collect security-related data from a large set of heterogeneous sources for centralized analysis and correlation.&lt;/p&gt;

&lt;p&gt;In this paper, we outline a flexible abstraction layer for access to secu- rity context. It is conceived to program and gather data from lightweight inspection and enforcement hooks deployed in cloud applications and IoT devices. We provide a description of its implementation, by reviewing the main software components and their role.&lt;/p&gt;

&lt;p&gt;Finally, we test this abstraction layer with a performance evaluation of a Proof of Concept (PoC) implementation with the aim to evaluate the effectiveness to collect data / logs from virtual services and IoT to enable a centralized security analysis.&lt;/p&gt;</description>
  </descriptions>
  <fundingReferences>
    <fundingReference>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/786922/">786922</awardNumber>
      <awardTitle>AddreSsing ThReats for virtualIseD services</awardTitle>
    </fundingReference>
    <fundingReference>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/833456/">833456</awardNumber>
      <awardTitle>A cybersecurity framework to GUArantee Reliability and trust for Digital service chains</awardTitle>
    </fundingReference>
  </fundingReferences>
</resource>
22
124
views
downloads
Views 22
Downloads 124
Data volume 138.9 MB
Unique views 20
Unique downloads 94

Share

Cite as