Conference paper Open Access

Data Log Management for Cyber-Security Programmability of Cloud Services and Applications

Carrega, Alessandro; Repetto, Matteo


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/40a58b3a-42d9-43bf-a3eb-277d909ac030/cysarm-2.pdf"
      }, 
      "checksum": "md5:c6db0cfff0e572f38029ab2e1ebac6b6", 
      "bucket": "40a58b3a-42d9-43bf-a3eb-277d909ac030", 
      "key": "cysarm-2.pdf", 
      "type": "pdf", 
      "size": 1120323
    }
  ], 
  "owners": [
    70950
  ], 
  "doi": "10.1145/3338511.3357351", 
  "stats": {
    "version_unique_downloads": 94.0, 
    "unique_views": 20.0, 
    "views": 22.0, 
    "version_views": 22.0, 
    "unique_downloads": 94.0, 
    "version_unique_views": 20.0, 
    "volume": 138920052.0, 
    "version_downloads": 124.0, 
    "downloads": 124.0, 
    "version_volume": 138920052.0
  }, 
  "links": {
    "doi": "https://doi.org/10.1145/3338511.3357351", 
    "latest_html": "https://zenodo.org/record/3813158", 
    "bucket": "https://zenodo.org/api/files/40a58b3a-42d9-43bf-a3eb-277d909ac030", 
    "badge": "https://zenodo.org/badge/doi/10.1145/3338511.3357351.svg", 
    "html": "https://zenodo.org/record/3813158", 
    "latest": "https://zenodo.org/api/records/3813158"
  }, 
  "created": "2020-05-07T07:43:30.124573+00:00", 
  "updated": "2020-11-11T15:30:30.075032+00:00", 
  "conceptrecid": "3813157", 
  "revision": 5, 
  "id": 3813158, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.1145/3338511.3357351", 
    "description": "<p>In last years, the security appliance is becoming a more important and critical challenge considering the growing complexity and diversification of cyber-attacks. The current solutions are often too cumbersome to be run in virtual services and Internet of Things (IoT) devices. Therefore, it is neces- sary to evolve to a more cooperative models, which collect security-related data from a large set of heterogeneous sources for centralized analysis and correlation.</p>\n\n<p>In this paper, we outline a flexible abstraction layer for access to secu- rity context. It is conceived to program and gather data from lightweight inspection and enforcement hooks deployed in cloud applications and IoT devices. We provide a description of its implementation, by reviewing the main software components and their role.</p>\n\n<p>Finally, we test this abstraction layer with a performance evaluation of a Proof of Concept (PoC) implementation with the aim to evaluate the effectiveness to collect data / logs from virtual services and IoT to enable a centralized security analysis.</p>", 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "title": "Data Log Management for Cyber-Security Programmability of Cloud Services and Applications", 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "3813157"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "3813158"
          }
        }
      ]
    }, 
    "grants": [
      {
        "code": "786922", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::786922"
        }, 
        "title": "AddreSsing ThReats for virtualIseD services", 
        "acronym": "ASTRID", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }, 
      {
        "code": "833456", 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::833456"
        }, 
        "title": "A cybersecurity framework to GUArantee Reliability and trust for Digital service chains", 
        "acronym": "GUARD", 
        "program": "H2020", 
        "funder": {
          "doi": "10.13039/501100000780", 
          "acronyms": [], 
          "name": "European Commission", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }
        }
      }
    ], 
    "communities": [
      {
        "id": "guard-project"
      }
    ], 
    "publication_date": "2019-11-15", 
    "creators": [
      {
        "affiliation": "CNIT", 
        "name": "Carrega, Alessandro"
      }, 
      {
        "orcid": "0000-0001-8478-2633", 
        "affiliation": "CNIT", 
        "name": "Repetto, Matteo"
      }
    ], 
    "meeting": {
      "acronym": "CCS2019", 
      "dates": "11-15 November 2019", 
      "session": "CYSARM 2019 : Workshop on Cyber-Security Arms Race", 
      "place": "London, UK", 
      "title": "26th ACM Conference on Computer and Communications Security"
    }, 
    "access_right": "open", 
    "resource_type": {
      "subtype": "conferencepaper", 
      "type": "publication", 
      "title": "Conference paper"
    }
  }
}
22
124
views
downloads
Views 22
Downloads 124
Data volume 138.9 MB
Unique views 20
Unique downloads 94

Share

Cite as