Short Paper Data Log Management for Cyber-Security Programmability of Cloud Services and Applications

被引:0
|
作者
Carrega, Alessandro [1 ]
Repetto, Matteo [1 ]
机构
[1] CNIT, Natl Lab Smart & Secure Networks S2N, Genoa, Italy
关键词
Data Inspection; Log Management; Cyber-Security; Programmability; Cloud;
D O I
10.1145/3338511.3357351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In last years, the security appliance is becoming a more important and critical challenge considering the growing complexity and diversification of cyber-attacks. The current solutions are often too cumbersome to be run in virtual services and Internet of Things (IoT) devices. Therefore, it is necessary to evolve to a more cooperative models, which collect security-related data from a large set of heterogeneous sources for centralized analysis and correlation. In this paper, we outline a flexible abstraction layer for access to security context. It is conceived to program and gather data from lightweight inspection and enforcement hooks deployed in cloud applications and IoT devices. We provide a description of its implementation, by reviewing the main software components and their role. Finally, we test this abstraction layer with a performance evaluation of a PoC implementation with the aim to evaluate the effectiveness to collect data/logs from virtual services and IoT to enable a centralized security analysis.
引用
收藏
页码:47 / 52
页数:6
相关论文
共 50 条
  • [21] Methodology for risk management related to cyber-security of Unmanned Aircraft Systems
    Tran, Trung Duc
    Thiriet, Jean-Marc
    Marchand, Nicolas
    El Mrabti, Amin
    Luculli, Gabriele
    [J]. 2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 695 - 702
  • [22] A Study of Data Fusion for Predicting Novel Activity in Enterprise Cyber-Security
    Hogan, Jack
    Adams, Niall M.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 37 - 42
  • [23] Cyber-security trust model through adaptive cloud authentication protocol for web application
    Alsuwat, Hatim
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (04)
  • [24] Optimal Control via Waveform Relaxation for Power Systems Cyber-Security Applications
    Park, Byungkwon
    DeMarco, Christopher L.
    [J]. 2016 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PESGM), 2016,
  • [25] A Security Management for Cloud Based Applications and Services with Diameter-AAA
    Sah, Sushil Kumar
    Shakya, Saroj
    Dhungana, Hariom
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 6 - 11
  • [26] System log clustering approaches for cyber security applications: A survey
    Landauer, Max
    Skopik, Florian
    Wurzenberger, Markus
    Rauber, Andreas
    [J]. COMPUTERS & SECURITY, 2020, 92
  • [27] Security assessment of data management systems for cyber physical system applications
    Chaudhry, Natalia
    Yousaf, Muhammad Murtaza
    Khan, Muhammad Taimoor
    [J]. JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2020, 32 (02)
  • [28] The 2nd International Conference on Big Data and Cyber-Security Intelligence
    Taher, Yehia
    [J]. CEUR Workshop Proceedings, 2019, 2622
  • [29] A cloud computing based system for cyber security management
    Xu, Guobin
    Yu, Wei
    Chen, Zhijiang
    Zhang, Hanlin
    Moulema, Paul
    Fu, Xinwen
    Lu, Chao
    [J]. INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2015, 30 (01) : 29 - 45
  • [30] Machine Learning: The Cyber-Security, Privacy, and Public Safety Opportunities and Challenges for Emerging Applications
    Guo, Kehua
    Tan, Zhiyuan
    Luo, Entao
    Zhou, Xiaokang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021