Short Paper Data Log Management for Cyber-Security Programmability of Cloud Services and Applications

被引:0
|
作者
Carrega, Alessandro [1 ]
Repetto, Matteo [1 ]
机构
[1] CNIT, Natl Lab Smart & Secure Networks S2N, Genoa, Italy
关键词
Data Inspection; Log Management; Cyber-Security; Programmability; Cloud;
D O I
10.1145/3338511.3357351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In last years, the security appliance is becoming a more important and critical challenge considering the growing complexity and diversification of cyber-attacks. The current solutions are often too cumbersome to be run in virtual services and Internet of Things (IoT) devices. Therefore, it is necessary to evolve to a more cooperative models, which collect security-related data from a large set of heterogeneous sources for centralized analysis and correlation. In this paper, we outline a flexible abstraction layer for access to security context. It is conceived to program and gather data from lightweight inspection and enforcement hooks deployed in cloud applications and IoT devices. We provide a description of its implementation, by reviewing the main software components and their role. Finally, we test this abstraction layer with a performance evaluation of a PoC implementation with the aim to evaluate the effectiveness to collect data/logs from virtual services and IoT to enable a centralized security analysis.
引用
收藏
页码:47 / 52
页数:6
相关论文
共 50 条
  • [1] Cyber-Security and a Potential Role for the Maritime Cloud
    Wimpenny, G.
    Safar, J.
    Grant, A.
    Bransby, M.
    Ward, N.
    [J]. PROCEEDINGS OF THE 30TH INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2017), 2017, : 1800 - 1808
  • [2] Scalable Cyber-Security for Terabit Cloud Computing
    Ros-Giralt, Jordi
    Szilagyi, Peter
    Lethin, Richard
    [J]. 2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC), 2012, : 1607 - 1616
  • [3] An Intelligent Quantum Cyber-Security Framework for Healthcare Data Management
    Gupta, Kishu
    Saxena, Deepika
    Rani, Pooja
    Kumar, Jitendra
    Makkar, Aaisha
    Singh, Ashutosh Kumar
    Lee, Chung-Nan
    [J]. IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024,
  • [4] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    [J]. JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [5] State-of-The-Art of Cloud Computing Cyber-Security
    Bennasar, Hanane
    Essaaidi, Mohammad
    Bendahmane, Ahmed
    Ben-othman, Jalel
    [J]. PROCEEDINGS OF 2015 THIRD IEEE WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2015,
  • [6] Exploring Cyber-Security Issues in Vessel Traffic Services
    Kalogeraki, Eleni Maria
    Papastergiou, Spyridon
    Polemi, Nineta
    Douligeris, Christos
    Panayiotopoulos, Themis
    [J]. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2018), PT I, 2018, 11061 : 442 - 451
  • [7] Critical Infrastructure Cyber-Security Risk Management
    Spyridopoulos, Theodoros
    Maraslis, Konstantinos
    Tryfonas, Theo
    Oikonomou, George
    [J]. TERRORISTS' USE OF THE INTERNET: ASSESSMENT AND RESPONSE, 2017, 136 : 59 - 76
  • [8] An anomaly detection framework for cyber-security data
    Evangelou, Marina
    Adams, Niall M.
    [J]. COMPUTERS & SECURITY, 2020, 97
  • [9] An Overview of the State-of-the-Art of Cloud Computing Cyber-Security
    Bennasar, H.
    Bendahmane, A.
    Essaaidi, M.
    [J]. CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 56 - 67
  • [10] ACE - An Anomaly Contribution Explainer for Cyber-Security Applications
    Zhang, Xiao
    Marwah, Manish
    Lee, I-ta
    Arlitt, Martin
    Goldwasser, Dan
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 1991 - 2000