Conference paper Open Access

Data Log Management for Cyber-Security Programmability of Cloud Services and Applications

Carrega, Alessandro; Repetto, Matteo

MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="">
  <controlfield tag="005">20201111153030.0</controlfield>
  <controlfield tag="001">3813158</controlfield>
  <datafield tag="711" ind1=" " ind2=" ">
    <subfield code="d">11-15 November 2019</subfield>
    <subfield code="g">CCS2019</subfield>
    <subfield code="a">26th ACM Conference on Computer and Communications Security</subfield>
    <subfield code="c">London, UK</subfield>
    <subfield code="n">CYSARM 2019 : Workshop on Cyber-Security Arms Race</subfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">CNIT</subfield>
    <subfield code="0">(orcid)0000-0001-8478-2633</subfield>
    <subfield code="a">Repetto, Matteo</subfield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">1120323</subfield>
    <subfield code="z">md5:c6db0cfff0e572f38029ab2e1ebac6b6</subfield>
    <subfield code="u"></subfield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2019-11-15</subfield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="p">user-guard-project</subfield>
    <subfield code="o"></subfield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">CNIT</subfield>
    <subfield code="a">Carrega, Alessandro</subfield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Data Log Management for Cyber-Security Programmability of Cloud Services and Applications</subfield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-guard-project</subfield>
  <datafield tag="536" ind1=" " ind2=" ">
    <subfield code="c">786922</subfield>
    <subfield code="a">AddreSsing ThReats for virtualIseD services</subfield>
  <datafield tag="536" ind1=" " ind2=" ">
    <subfield code="c">833456</subfield>
    <subfield code="a">A cybersecurity framework to GUArantee Reliability and trust for Digital service chains</subfield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u"></subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2"></subfield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;In last years, the security appliance is becoming a more important and critical challenge considering the growing complexity and diversification of cyber-attacks. The current solutions are often too cumbersome to be run in virtual services and Internet of Things (IoT) devices. Therefore, it is neces- sary to evolve to a more cooperative models, which collect security-related data from a large set of heterogeneous sources for centralized analysis and correlation.&lt;/p&gt;

&lt;p&gt;In this paper, we outline a flexible abstraction layer for access to secu- rity context. It is conceived to program and gather data from lightweight inspection and enforcement hooks deployed in cloud applications and IoT devices. We provide a description of its implementation, by reviewing the main software components and their role.&lt;/p&gt;

&lt;p&gt;Finally, we test this abstraction layer with a performance evaluation of a Proof of Concept (PoC) implementation with the aim to evaluate the effectiveness to collect data / logs from virtual services and IoT to enable a centralized security analysis.&lt;/p&gt;</subfield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.1145/3338511.3357351</subfield>
    <subfield code="2">doi</subfield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">conferencepaper</subfield>
Views 22
Downloads 124
Data volume 138.9 MB
Unique views 20
Unique downloads 94


Cite as