Conference paper Open Access
Carrega, Alessandro;
Repetto, Matteo
<?xml version='1.0' encoding='utf-8'?> <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"> <dc:creator>Carrega, Alessandro</dc:creator> <dc:creator>Repetto, Matteo</dc:creator> <dc:date>2019-11-15</dc:date> <dc:description>In last years, the security appliance is becoming a more important and critical challenge considering the growing complexity and diversification of cyber-attacks. The current solutions are often too cumbersome to be run in virtual services and Internet of Things (IoT) devices. Therefore, it is neces- sary to evolve to a more cooperative models, which collect security-related data from a large set of heterogeneous sources for centralized analysis and correlation. In this paper, we outline a flexible abstraction layer for access to secu- rity context. It is conceived to program and gather data from lightweight inspection and enforcement hooks deployed in cloud applications and IoT devices. We provide a description of its implementation, by reviewing the main software components and their role. Finally, we test this abstraction layer with a performance evaluation of a Proof of Concept (PoC) implementation with the aim to evaluate the effectiveness to collect data / logs from virtual services and IoT to enable a centralized security analysis.</dc:description> <dc:identifier>https://zenodo.org/record/3813158</dc:identifier> <dc:identifier>10.1145/3338511.3357351</dc:identifier> <dc:identifier>oai:zenodo.org:3813158</dc:identifier> <dc:relation>info:eu-repo/grantAgreement/EC/H2020/786922/</dc:relation> <dc:relation>info:eu-repo/grantAgreement/EC/H2020/833456/</dc:relation> <dc:relation>url:https://zenodo.org/communities/guard-project</dc:relation> <dc:rights>info:eu-repo/semantics/openAccess</dc:rights> <dc:rights>https://creativecommons.org/licenses/by/4.0/legalcode</dc:rights> <dc:title>Data Log Management for Cyber-Security Programmability of Cloud Services and Applications</dc:title> <dc:type>info:eu-repo/semantics/conferencePaper</dc:type> <dc:type>publication-conferencepaper</dc:type> </oai_dc:dc>
Views | 22 |
Downloads | 124 |
Data volume | 138.9 MB |
Unique views | 20 |
Unique downloads | 94 |