An abstraction layer for cybersecurity context
Title | An abstraction layer for cybersecurity context |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Bolla, R., Carrega, A., Repetto, M. |
Conference Name | 2019 International Conference on Computing, Networking and Communications (ICNC) |
Publisher | IEEE |
ISBN Number | 978-1-5386-9223-3 |
Keywords | cloud applications, cloud computing, composability, cyber-attacks, cyber-security frameworks, cybersecurity context, enforcement hooks, flexible abstraction layer, heterogeneous sources, Internet of Things, IoT devices, lightweight inspection, Metrics, object oriented security, object-oriented programming, pubcrawl, resilience, Resiliency, security appliances, security context, security of data, security-related data, software components, telecommunication security, virtual services |
Abstract | The growing complexity and diversification of cyber-attacks are largely reflected in the increasing sophistication of security appliances, which are often too cumbersome to be run in virtual services and IoT devices. Hence, the design of cyber-security frameworks is today looking at more cooperative models, which collect security-related data from a large set of heterogeneous sources for centralized analysis and correlation.In this paper, we outline a flexible abstraction layer for access to security context. It is conceived to program and gather data from lightweight inspection and enforcement hooks deployed in cloud applications and IoT devices. We also provide a preliminary description of its implementation, by reviewing the main software components and their role. |
URL | https://ieeexplore.ieee.org/document/8685665 |
DOI | 10.1109/ICCNC.2019.8685665 |
Citation Key | bolla_abstraction_2019 |
- Metrics
- virtual services
- telecommunication security
- software components
- security-related data
- security of data
- security context
- security appliances
- Resiliency
- resilience
- pubcrawl
- object-oriented programming
- object oriented security
- cloud applications
- lightweight inspection
- IoT devices
- Internet of Things
- heterogeneous sources
- flexible abstraction layer
- enforcement hooks
- cybersecurity context
- cyber-security frameworks
- cyber-attacks
- composability
- Cloud Computing