publication . Conference object . 2019

Data Log Management for Cyber-Security Programmability of Cloud Services and Applications

Alessandro Carrega; Matteo Repetto;
Open Access
  • Published: 15 Nov 2019
  • Publisher: ACM Press
In last years, the security appliance is becoming a more important and critical challenge considering the growing complexity and diversification of cyber-attacks. The current solutions are often too cumbersome to be run in virtual services and Internet of Things (IoT) devices. Therefore, it is neces- sary to evolve to a more cooperative models, which collect security-related data from a large set of heterogeneous sources for centralized analysis and correlation. In this paper, we outline a flexible abstraction layer for access to secu- rity context. It is conceived to program and gather data from lightweight inspection and enforcement hooks deployed in cloud app...
free text keywords: Abstraction layer, Computer science, Cloud computing, business.industry, business, Computer security, computer.software_genre, computer, Diversification (marketing strategy), Log management, Proof of concept, Enforcement, Component-based software engineering, Security analysis
Funded by
AddreSsing ThReats for virtualIseD services
  • Funder: European Commission (EC)
  • Project Code: 786922
  • Funding stream: H2020 | RIA
A cybersecurity framework to GUArantee Reliability and trust for Digital service chains
  • Funder: European Commission (EC)
  • Project Code: 833456
  • Funding stream: H2020 | IA
Any information missing or wrong?Report an Issue