Opendata, web and dolomites

CYBER-TRUST SIGNED

Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

 CYBER-TRUST project word cloud

Explore the words cloud of the CYBER-TRUST project. It provides you a very rough idea of what is the project "CYBER-TRUST" about.

grand    attacker    monitoring    botnets    mitigation    attack    unknown    threat    proactive    emphasis    tamper    detection    agencies    proof    delivered    profiles    ways    flawed    malicious    detecting    protection    arising    surface    hardware    tackle    blockchain    virtual    enforcement    tools    forensic    mitigating    capture    attacks    network    exploited    structure    cyber    employed    day    distributed    critical    framework    accurate    responding    infected    optimally    incidents    innovative    accordance    ledgers    zero    law    techniques    integrity    trust    phases    gathering    monitor    vulnerability    isolating    privacy    defence    relying    damage    alleged    collecting    legacy    blockchains    intelligence    vulnerabilities    preserving    ddos    building    interdisciplinary    regulations    storing    ecosystem    easily    platform    prevent    data    visualisation    iot    sharing    autonomous    securing    technologies    intelligent    launch    criminals    compromise    security    considerably    infrastructures    minimise    toward    alter   

Project "CYBER-TRUST" data sheet

The following table provides information about the project.

Coordinator
KENTRO MELETON ASFALEIAS 

Organization address
address: P KANELLOPOULOU 4 ST
city: ATHINA
postcode: 10177
website: www.kemea.gr

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Greece [EL]
 Project website https://www.cyber-trust.eu/
 Total cost 2˙996˙182 €
 EC max contribution 2˙996˙182 € (100%)
 Programme 1. H2020-EU.3.7.4. (Improve cyber security)
 Code Call H2020-DS-SC7-2017
 Funding Scheme RIA
 Starting year 2018
 Duration (year-month-day) from 2018-05-01   to  2021-04-30

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    KENTRO MELETON ASFALEIAS EL (ATHINA) coordinator 434˙662.00
2    UNIVERSITY OF PELOPONNESE EL (TRIPOLIS) participant 413˙750.00
3    UNIVERSITY OF PLYMOUTH UK (PLYMOUTH) participant 398˙395.00
4    CGI NEDERLAND BV NL (ROTTERDAM) participant 365˙687.00
5    MATHEMA SRL IT (FIRENZE) participant 341˙312.00
6    ADITESS ADVANCED INTEGRATED TECHNOLOGY SOLUTIONS & SERVICES LTD CY (LEFKOSIA) participant 340˙625.00
7    SCORECHAIN SA LU (ESCH SUR ALZETTE) participant 324˙375.00
8    VRIJE UNIVERSITEIT BRUSSEL BE (BRUSSEL) participant 234˙375.00
9    HELLENIC TELECOMMUNICATIONS ORGANIZATION S.A. - OTE AE (ORGANISMOS TILEPIKOINONION TIS ELLADOS OTE AE) EL (Maroussi - Athens) participant 128˙112.00
10    MTN CYPRUS LIMITED CY (LEFKOSIA) participant 14˙887.00

Map

 Project objective

The CYBER-TRUST project aims to develop an innovative cyber-threat intelligence gathering, detection, and mitigation platform to tackle the grand challenges towards securing the ecosystem of IoT devices. The security problems arising from the flawed design of legacy hardware and embedded devices allows cyber-criminals to easily compromise them and launch large-scale attacks toward critical cyber-infrastructures. The proposed interdisciplinary approach will capture different phases of such emerging attacks, before and after known (even years old) or unknown (zero-day) vulnerabilities have been widely exploited by cyber-criminals to launch the attack. Emphasis is given on building a proactive cyber-threat intelligence gathering and sharing system to prevent the exploitation of zero-day vulnerabilities. This intelligence information will be used to maintain accurate vulnerability profiles of IoT devices, in accordance with data protection, privacy, or other regulations, and optimally alter their attack surface to minimise the damage from cyber-attacks. Novel technologies will be developed, based on distributed ledgers and blockchains, to monitor devices’ integrity state and network behaviour that will considerably increase the detection and response capabilities against targeted and interdisciplinary cyber-attacks. In the case of alleged malicious activity, tools for collecting and storing forensic evidence on a tamper-proof blockchain structure will be delivered, taking into account the specific needs of law enforcement agencies. Privacy-preserving network monitoring and advanced virtual reality-based visualisation techniques will be employed for quickly detecting botnets, DDoS attacks and other incidents. Relying on interdisciplinary research, an intelligent autonomous cyber-defence framework will be built for providing intelligent ways of isolating the devices under an attacker’s control (or infected) and effectively responding to and mitigating large-scale attacks.

 Deliverables

List of deliverables.
CYBER-TRUST end-user requirements Documents, reports 2020-04-24 06:26:55
Legal analysis of the use of evidence material Documents, reports 2020-04-24 06:26:54
Architecture and design specifications: initial Documents, reports 2020-04-24 06:26:54
CYBER-TRUST use case scenarios Documents, reports 2020-04-24 06:26:54
Threat actors’ attack strategies Documents, reports 2020-04-24 06:26:54
Threat sharing methods: comparative analysis Documents, reports 2020-04-24 06:26:54

Take a look to the deliverables list in detail:  detailed list of CYBER-TRUST deliverables.

 Publications

year authors and title journal last update
List of publications.
2019 5. Gkotsopoulou, O., Charalambous, E., Limniotis, K., Quinn, P., Kavallieros, D., Sargsyan, G., Shiaeles, S., Kolokotronis, N.
Data Protection by Design for Cybersecurity Systems in a Smart Home Environment
published pages: , ISSN: , DOI:
1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft) 2020-04-24
2019 Brotsis, S., Kolokotronis, N., Limniotis, K., Shiaeles, S., Kavallieros, D., Bellini, E., Pavue, C.
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
published pages: , ISSN: , DOI:
1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft) 2020-04-24
2019 Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Romain Griffiths
Secured by Blockchain: Safeguarding Internet of Things Devices
published pages: 28-34, ISSN: 2162-2256, DOI: 10.1109/mce.2019.2892221
IEEE Consumer Electronics Magazine 8/3 2020-04-24
2019 Costas Vassilakis
Blockchain technologies for leveraging security and privacy
published pages: 7, ISSN: 2585-3899, DOI: 10.12681/homvir.20188
Homo Virtualis 2/1 2020-04-24
2019 Baptista, I., Shiaeles, S., Kolokotronis, N.
A Novel Malware Detection System Based On Machine Learning and Binary Visualization
published pages: , ISSN: , DOI:
In * 2019 1st International Workshop on Data Driven Intelligence for Networks and Systems (DDINS) 2020-04-24

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "CYBER-TRUST" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "CYBER-TRUST" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.3.7.4.)

FORESIGHT (2019)

Advanced cyber-security simulation platform for preparedness training in Aviation, Naval and Power-grid environments

Read More  

SPIDER (2019)

a cyberSecurity Platform for vIrtualiseD 5G cybEr Range services

Read More  

Cyber-MAR (2019)

Cyber preparedness actions for a holistic approach and awareness raising in the MARitime logistics supply chain

Read More