Opendata, web and dolomites

CYBER-TRUST SIGNED

Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

 CYBER-TRUST project word cloud

Explore the words cloud of the CYBER-TRUST project. It provides you a very rough idea of what is the project "CYBER-TRUST" about.

employed    hardware    considerably    compromise    building    visualisation    relying    network    mitigating    malicious    protection    collecting    distributed    accordance    surface    proactive    integrity    criminals    tamper    infected    storing    enforcement    technologies    unknown    grand    arising    forensic    iot    autonomous    detection    intelligence    securing    framework    responding    zero    preserving    data    botnets    alter    vulnerability    techniques    flawed    security    blockchains    isolating    gathering    attack    day    tackle    agencies    prevent    optimally    exploited    monitoring    legacy    tools    cyber    mitigation    alleged    law    privacy    delivered    trust    regulations    toward    critical    proof    structure    ways    phases    incidents    ledgers    attacker    sharing    virtual    ddos    profiles    intelligent    launch    interdisciplinary    detecting    easily    attacks    damage    threat    innovative    platform    accurate    monitor    ecosystem    emphasis    infrastructures    vulnerabilities    blockchain    minimise    defence    capture   

Project "CYBER-TRUST" data sheet

The following table provides information about the project.

Coordinator
KENTRO MELETON ASFALEIAS 

Organization address
address: P KANELLOPOULOU 4 ST
city: ATHINA
postcode: 10177
website: www.kemea.gr

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Greece [EL]
 Project website https://www.cyber-trust.eu/
 Total cost 2˙996˙182 €
 EC max contribution 2˙996˙182 € (100%)
 Programme 1. H2020-EU.3.7.4. (Improve cyber security)
 Code Call H2020-DS-SC7-2017
 Funding Scheme RIA
 Starting year 2018
 Duration (year-month-day) from 2018-05-01   to  2021-04-30

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    KENTRO MELETON ASFALEIAS EL (ATHINA) coordinator 434˙662.00
2    UNIVERSITY OF PELOPONNESE EL (TRIPOLIS) participant 413˙750.00
3    UNIVERSITY OF PLYMOUTH UK (PLYMOUTH) participant 398˙395.00
4    CGI NEDERLAND BV NL (ROTTERDAM) participant 365˙687.00
5    MATHEMA SRL IT (FIRENZE) participant 341˙312.00
6    ADITESS ADVANCED INTEGRATED TECHNOLOGY SOLUTIONS & SERVICES LTD CY (LEFKOSIA) participant 340˙625.00
7    SCORECHAIN SA LU (ESCH SUR ALZETTE) participant 324˙375.00
8    VRIJE UNIVERSITEIT BRUSSEL BE (BRUSSEL) participant 234˙375.00
9    HELLENIC TELECOMMUNICATIONS ORGANIZATION S.A. - OTE AE (ORGANISMOS TILEPIKOINONION TIS ELLADOS OTE AE) EL (Maroussi - Athens) participant 128˙112.00
10    MTN CYPRUS LIMITED CY (LEFKOSIA) participant 14˙887.00

Map

 Project objective

The CYBER-TRUST project aims to develop an innovative cyber-threat intelligence gathering, detection, and mitigation platform to tackle the grand challenges towards securing the ecosystem of IoT devices. The security problems arising from the flawed design of legacy hardware and embedded devices allows cyber-criminals to easily compromise them and launch large-scale attacks toward critical cyber-infrastructures. The proposed interdisciplinary approach will capture different phases of such emerging attacks, before and after known (even years old) or unknown (zero-day) vulnerabilities have been widely exploited by cyber-criminals to launch the attack. Emphasis is given on building a proactive cyber-threat intelligence gathering and sharing system to prevent the exploitation of zero-day vulnerabilities. This intelligence information will be used to maintain accurate vulnerability profiles of IoT devices, in accordance with data protection, privacy, or other regulations, and optimally alter their attack surface to minimise the damage from cyber-attacks. Novel technologies will be developed, based on distributed ledgers and blockchains, to monitor devices’ integrity state and network behaviour that will considerably increase the detection and response capabilities against targeted and interdisciplinary cyber-attacks. In the case of alleged malicious activity, tools for collecting and storing forensic evidence on a tamper-proof blockchain structure will be delivered, taking into account the specific needs of law enforcement agencies. Privacy-preserving network monitoring and advanced virtual reality-based visualisation techniques will be employed for quickly detecting botnets, DDoS attacks and other incidents. Relying on interdisciplinary research, an intelligent autonomous cyber-defence framework will be built for providing intelligent ways of isolating the devices under an attacker’s control (or infected) and effectively responding to and mitigating large-scale attacks.

 Deliverables

List of deliverables.
CYBER-TRUST end-user requirements Documents, reports 2020-04-24 06:26:55
Legal analysis of the use of evidence material Documents, reports 2020-04-24 06:26:54
Architecture and design specifications: initial Documents, reports 2020-04-24 06:26:54
CYBER-TRUST use case scenarios Documents, reports 2020-04-24 06:26:54
Threat actors’ attack strategies Documents, reports 2020-04-24 06:26:54
Threat sharing methods: comparative analysis Documents, reports 2020-04-24 06:26:54

Take a look to the deliverables list in detail:  detailed list of CYBER-TRUST deliverables.

 Publications

year authors and title journal last update
List of publications.
2019 5. Gkotsopoulou, O., Charalambous, E., Limniotis, K., Quinn, P., Kavallieros, D., Sargsyan, G., Shiaeles, S., Kolokotronis, N.
Data Protection by Design for Cybersecurity Systems in a Smart Home Environment
published pages: , ISSN: , DOI:
1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft) 2020-04-24
2019 Brotsis, S., Kolokotronis, N., Limniotis, K., Shiaeles, S., Kavallieros, D., Bellini, E., Pavue, C.
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
published pages: , ISSN: , DOI:
1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft) 2020-04-24
2019 Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Romain Griffiths
Secured by Blockchain: Safeguarding Internet of Things Devices
published pages: 28-34, ISSN: 2162-2256, DOI: 10.1109/mce.2019.2892221
IEEE Consumer Electronics Magazine 8/3 2020-04-24
2019 Costas Vassilakis
Blockchain technologies for leveraging security and privacy
published pages: 7, ISSN: 2585-3899, DOI: 10.12681/homvir.20188
Homo Virtualis 2/1 2020-04-24
2019 Baptista, I., Shiaeles, S., Kolokotronis, N.
A Novel Malware Detection System Based On Machine Learning and Binary Visualization
published pages: , ISSN: , DOI:
In * 2019 1st International Workshop on Data Driven Intelligence for Networks and Systems (DDINS) 2020-04-24

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "CYBER-TRUST" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "CYBER-TRUST" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.3.7.4.)

FORESIGHT (2019)

Advanced cyber-security simulation platform for preparedness training in Aviation, Naval and Power-grid environments

Read More  

SPIDER (2019)

a cyberSecurity Platform for vIrtualiseD 5G cybEr Range services

Read More  

Cyber-MAR (2019)

Cyber preparedness actions for a holistic approach and awareness raising in the MARitime logistics supply chain

Read More