Opendata, web and dolomites

CYBER-TRUST SIGNED

Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

 CYBER-TRUST project word cloud

Explore the words cloud of the CYBER-TRUST project. It provides you a very rough idea of what is the project "CYBER-TRUST" about.

mitigation    ways    monitoring    critical    storing    forensic    employed    easily    flawed    building    regulations    alleged    technologies    launch    detection    arising    isolating    vulnerabilities    blockchains    privacy    detecting    attack    minimise    legacy    delivered    compromise    virtual    unknown    monitor    proof    gathering    attacks    profiles    malicious    damage    autonomous    blockchain    enforcement    intelligent    botnets    infrastructures    criminals    toward    relying    techniques    visualisation    grand    network    security    day    law    platform    data    trust    threat    ddos    collecting    zero    proactive    attacker    ledgers    hardware    iot    innovative    mitigating    responding    emphasis    tools    considerably    ecosystem    alter    accurate    phases    agencies    framework    tackle    defence    preserving    interdisciplinary    vulnerability    infected    accordance    capture    prevent    incidents    protection    surface    sharing    distributed    intelligence    integrity    cyber    optimally    structure    securing    tamper    exploited   

Project "CYBER-TRUST" data sheet

The following table provides information about the project.

Coordinator
KENTRO MELETON ASFALEIAS 

Organization address
address: P KANELLOPOULOU 4 ST
city: ATHINA
postcode: 10177
website: www.kemea.gr

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Greece [EL]
 Project website https://www.cyber-trust.eu/
 Total cost 2˙996˙182 €
 EC max contribution 2˙996˙182 € (100%)
 Programme 1. H2020-EU.3.7.4. (Improve cyber security)
 Code Call H2020-DS-SC7-2017
 Funding Scheme RIA
 Starting year 2018
 Duration (year-month-day) from 2018-05-01   to  2021-04-30

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    KENTRO MELETON ASFALEIAS EL (ATHINA) coordinator 434˙662.00
2    UNIVERSITY OF PELOPONNESE EL (TRIPOLIS) participant 413˙750.00
3    UNIVERSITY OF PLYMOUTH UK (PLYMOUTH) participant 398˙395.00
4    CGI NEDERLAND BV NL (ROTTERDAM) participant 365˙687.00
5    MATHEMA SRL IT (FIRENZE) participant 341˙312.00
6    ADITESS ADVANCED INTEGRATED TECHNOLOGY SOLUTIONS & SERVICES LTD CY (LEFKOSIA) participant 340˙625.00
7    SCORECHAIN SA LU (ESCH SUR ALZETTE) participant 324˙375.00
8    VRIJE UNIVERSITEIT BRUSSEL BE (BRUSSEL) participant 234˙375.00
9    HELLENIC TELECOMMUNICATIONS ORGANIZATION S.A. - OTE AE (ORGANISMOS TILEPIKOINONION TIS ELLADOS OTE AE) EL (Maroussi - Athens) participant 128˙112.00
10    MTN CYPRUS LIMITED CY (LEFKOSIA) participant 14˙887.00

Map

 Project objective

The CYBER-TRUST project aims to develop an innovative cyber-threat intelligence gathering, detection, and mitigation platform to tackle the grand challenges towards securing the ecosystem of IoT devices. The security problems arising from the flawed design of legacy hardware and embedded devices allows cyber-criminals to easily compromise them and launch large-scale attacks toward critical cyber-infrastructures. The proposed interdisciplinary approach will capture different phases of such emerging attacks, before and after known (even years old) or unknown (zero-day) vulnerabilities have been widely exploited by cyber-criminals to launch the attack. Emphasis is given on building a proactive cyber-threat intelligence gathering and sharing system to prevent the exploitation of zero-day vulnerabilities. This intelligence information will be used to maintain accurate vulnerability profiles of IoT devices, in accordance with data protection, privacy, or other regulations, and optimally alter their attack surface to minimise the damage from cyber-attacks. Novel technologies will be developed, based on distributed ledgers and blockchains, to monitor devices’ integrity state and network behaviour that will considerably increase the detection and response capabilities against targeted and interdisciplinary cyber-attacks. In the case of alleged malicious activity, tools for collecting and storing forensic evidence on a tamper-proof blockchain structure will be delivered, taking into account the specific needs of law enforcement agencies. Privacy-preserving network monitoring and advanced virtual reality-based visualisation techniques will be employed for quickly detecting botnets, DDoS attacks and other incidents. Relying on interdisciplinary research, an intelligent autonomous cyber-defence framework will be built for providing intelligent ways of isolating the devices under an attacker’s control (or infected) and effectively responding to and mitigating large-scale attacks.

 Deliverables

List of deliverables.
CYBER-TRUST end-user requirements Documents, reports 2020-04-24 06:26:55
Legal analysis of the use of evidence material Documents, reports 2020-04-24 06:26:54
Architecture and design specifications: initial Documents, reports 2020-04-24 06:26:54
CYBER-TRUST use case scenarios Documents, reports 2020-04-24 06:26:54
Threat actors’ attack strategies Documents, reports 2020-04-24 06:26:54
Threat sharing methods: comparative analysis Documents, reports 2020-04-24 06:26:54

Take a look to the deliverables list in detail:  detailed list of CYBER-TRUST deliverables.

 Publications

year authors and title journal last update
List of publications.
2019 5. Gkotsopoulou, O., Charalambous, E., Limniotis, K., Quinn, P., Kavallieros, D., Sargsyan, G., Shiaeles, S., Kolokotronis, N.
Data Protection by Design for Cybersecurity Systems in a Smart Home Environment
published pages: , ISSN: , DOI:
1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft) 2020-04-24
2019 Brotsis, S., Kolokotronis, N., Limniotis, K., Shiaeles, S., Kavallieros, D., Bellini, E., Pavue, C.
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
published pages: , ISSN: , DOI:
1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft) 2020-04-24
2019 Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Romain Griffiths
Secured by Blockchain: Safeguarding Internet of Things Devices
published pages: 28-34, ISSN: 2162-2256, DOI: 10.1109/mce.2019.2892221
IEEE Consumer Electronics Magazine 8/3 2020-04-24
2019 Costas Vassilakis
Blockchain technologies for leveraging security and privacy
published pages: 7, ISSN: 2585-3899, DOI: 10.12681/homvir.20188
Homo Virtualis 2/1 2020-04-24
2019 Baptista, I., Shiaeles, S., Kolokotronis, N.
A Novel Malware Detection System Based On Machine Learning and Binary Visualization
published pages: , ISSN: , DOI:
In * 2019 1st International Workshop on Data Driven Intelligence for Networks and Systems (DDINS) 2020-04-24

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "CYBER-TRUST" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "CYBER-TRUST" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.3.7.4.)

FORESIGHT (2019)

Advanced cyber-security simulation platform for preparedness training in Aviation, Naval and Power-grid environments

Read More  

SPIDER (2019)

a cyberSecurity Platform for vIrtualiseD 5G cybEr Range services

Read More  

Cyber-MAR (2019)

Cyber preparedness actions for a holistic approach and awareness raising in the MARitime logistics supply chain

Read More