Opendata, web and dolomites

CYBER-TRUST SIGNED

Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

 CYBER-TRUST project word cloud

Explore the words cloud of the CYBER-TRUST project. It provides you a very rough idea of what is the project "CYBER-TRUST" about.

delivered    securing    visualisation    day    distributed    critical    structure    isolating    regulations    criminals    iot    trust    ecosystem    detection    infrastructures    storing    blockchains    compromise    network    sharing    ddos    integrity    monitoring    flawed    botnets    vulnerabilities    exploited    malicious    legacy    damage    virtual    relying    phases    privacy    defence    toward    ways    emphasis    threat    tackle    proactive    intelligent    easily    technologies    security    considerably    attacks    prevent    responding    proof    alleged    capture    protection    interdisciplinary    attack    mitigating    grand    ledgers    unknown    blockchain    tools    hardware    preserving    enforcement    intelligence    infected    employed    arising    gathering    optimally    surface    launch    incidents    profiles    data    law    accurate    minimise    monitor    accordance    agencies    autonomous    tamper    framework    cyber    zero    collecting    vulnerability    techniques    building    detecting    innovative    mitigation    alter    platform    forensic    attacker   

Project "CYBER-TRUST" data sheet

The following table provides information about the project.

Coordinator
KENTRO MELETON ASFALEIAS 

Organization address
address: P KANELLOPOULOU 4 ST
city: ATHINA
postcode: 10177
website: www.kemea.gr

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Greece [EL]
 Project website https://www.cyber-trust.eu/
 Total cost 2˙996˙182 €
 EC max contribution 2˙996˙182 € (100%)
 Programme 1. H2020-EU.3.7.4. (Improve cyber security)
 Code Call H2020-DS-SC7-2017
 Funding Scheme RIA
 Starting year 2018
 Duration (year-month-day) from 2018-05-01   to  2021-04-30

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    KENTRO MELETON ASFALEIAS EL (ATHINA) coordinator 434˙662.00
2    UNIVERSITY OF PELOPONNESE EL (TRIPOLIS) participant 413˙750.00
3    UNIVERSITY OF PLYMOUTH UK (PLYMOUTH) participant 398˙395.00
4    CGI NEDERLAND BV NL (ROTTERDAM) participant 365˙687.00
5    MATHEMA SRL IT (FIRENZE) participant 341˙312.00
6    ADITESS ADVANCED INTEGRATED TECHNOLOGY SOLUTIONS & SERVICES LTD CY (LEFKOSIA) participant 340˙625.00
7    SCORECHAIN SA LU (ESCH SUR ALZETTE) participant 324˙375.00
8    VRIJE UNIVERSITEIT BRUSSEL BE (BRUSSEL) participant 234˙375.00
9    HELLENIC TELECOMMUNICATIONS ORGANIZATION S.A. - OTE AE (ORGANISMOS TILEPIKOINONION TIS ELLADOS OTE AE) EL (Maroussi - Athens) participant 128˙112.00
10    MTN CYPRUS LIMITED CY (LEFKOSIA) participant 14˙887.00

Map

 Project objective

The CYBER-TRUST project aims to develop an innovative cyber-threat intelligence gathering, detection, and mitigation platform to tackle the grand challenges towards securing the ecosystem of IoT devices. The security problems arising from the flawed design of legacy hardware and embedded devices allows cyber-criminals to easily compromise them and launch large-scale attacks toward critical cyber-infrastructures. The proposed interdisciplinary approach will capture different phases of such emerging attacks, before and after known (even years old) or unknown (zero-day) vulnerabilities have been widely exploited by cyber-criminals to launch the attack. Emphasis is given on building a proactive cyber-threat intelligence gathering and sharing system to prevent the exploitation of zero-day vulnerabilities. This intelligence information will be used to maintain accurate vulnerability profiles of IoT devices, in accordance with data protection, privacy, or other regulations, and optimally alter their attack surface to minimise the damage from cyber-attacks. Novel technologies will be developed, based on distributed ledgers and blockchains, to monitor devices’ integrity state and network behaviour that will considerably increase the detection and response capabilities against targeted and interdisciplinary cyber-attacks. In the case of alleged malicious activity, tools for collecting and storing forensic evidence on a tamper-proof blockchain structure will be delivered, taking into account the specific needs of law enforcement agencies. Privacy-preserving network monitoring and advanced virtual reality-based visualisation techniques will be employed for quickly detecting botnets, DDoS attacks and other incidents. Relying on interdisciplinary research, an intelligent autonomous cyber-defence framework will be built for providing intelligent ways of isolating the devices under an attacker’s control (or infected) and effectively responding to and mitigating large-scale attacks.

 Deliverables

List of deliverables.
CYBER-TRUST end-user requirements Documents, reports 2020-04-24 06:26:55
Legal analysis of the use of evidence material Documents, reports 2020-04-24 06:26:54
Architecture and design specifications: initial Documents, reports 2020-04-24 06:26:54
CYBER-TRUST use case scenarios Documents, reports 2020-04-24 06:26:54
Threat actors’ attack strategies Documents, reports 2020-04-24 06:26:54
Threat sharing methods: comparative analysis Documents, reports 2020-04-24 06:26:54

Take a look to the deliverables list in detail:  detailed list of CYBER-TRUST deliverables.

 Publications

year authors and title journal last update
List of publications.
2019 5. Gkotsopoulou, O., Charalambous, E., Limniotis, K., Quinn, P., Kavallieros, D., Sargsyan, G., Shiaeles, S., Kolokotronis, N.
Data Protection by Design for Cybersecurity Systems in a Smart Home Environment
published pages: , ISSN: , DOI:
1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft) 2020-04-24
2019 Brotsis, S., Kolokotronis, N., Limniotis, K., Shiaeles, S., Kavallieros, D., Bellini, E., Pavue, C.
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
published pages: , ISSN: , DOI:
1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft) 2020-04-24
2019 Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Romain Griffiths
Secured by Blockchain: Safeguarding Internet of Things Devices
published pages: 28-34, ISSN: 2162-2256, DOI: 10.1109/mce.2019.2892221
IEEE Consumer Electronics Magazine 8/3 2020-04-24
2019 Costas Vassilakis
Blockchain technologies for leveraging security and privacy
published pages: 7, ISSN: 2585-3899, DOI: 10.12681/homvir.20188
Homo Virtualis 2/1 2020-04-24
2019 Baptista, I., Shiaeles, S., Kolokotronis, N.
A Novel Malware Detection System Based On Machine Learning and Binary Visualization
published pages: , ISSN: , DOI:
In * 2019 1st International Workshop on Data Driven Intelligence for Networks and Systems (DDINS) 2020-04-24

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "CYBER-TRUST" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "CYBER-TRUST" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.3.7.4.)

FORESIGHT (2019)

Advanced cyber-security simulation platform for preparedness training in Aviation, Naval and Power-grid environments

Read More  

Cyber-MAR (2019)

Cyber preparedness actions for a holistic approach and awareness raising in the MARitime logistics supply chain

Read More  

SPIDER (2019)

a cyberSecurity Platform for vIrtualiseD 5G cybEr Range services

Read More