Opendata, web and dolomites

CYBER-TRUST SIGNED

Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

 CYBER-TRUST project word cloud

Explore the words cloud of the CYBER-TRUST project. It provides you a very rough idea of what is the project "CYBER-TRUST" about.

attack    structure    detecting    network    tamper    attacker    preserving    trust    ledgers    flawed    incidents    storing    threat    defence    malicious    sharing    day    legacy    monitoring    innovative    launch    surface    unknown    tools    damage    infrastructures    technologies    virtual    botnets    minimise    easily    blockchains    phases    framework    distributed    prevent    agencies    techniques    responding    compromise    regulations    ways    mitigation    profiles    optimally    alleged    autonomous    securing    intelligence    enforcement    attacks    capture    blockchain    mitigating    gathering    visualisation    accurate    zero    proof    alter    privacy    vulnerabilities    infected    integrity    toward    proactive    collecting    security    considerably    monitor    delivered    data    building    interdisciplinary    forensic    ddos    protection    exploited    iot    arising    intelligent    accordance    tackle    law    criminals    employed    grand    cyber    ecosystem    vulnerability    emphasis    hardware    critical    isolating    platform    relying    detection   

Project "CYBER-TRUST" data sheet

The following table provides information about the project.

Coordinator
KENTRO MELETON ASFALEIAS 

Organization address
address: P KANELLOPOULOU 4 ST
city: ATHINA
postcode: 10177
website: www.kemea.gr

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Greece [EL]
 Project website https://www.cyber-trust.eu/
 Total cost 2˙996˙182 €
 EC max contribution 2˙996˙182 € (100%)
 Programme 1. H2020-EU.3.7.4. (Improve cyber security)
 Code Call H2020-DS-SC7-2017
 Funding Scheme RIA
 Starting year 2018
 Duration (year-month-day) from 2018-05-01   to  2021-04-30

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    KENTRO MELETON ASFALEIAS EL (ATHINA) coordinator 434˙662.00
2    UNIVERSITY OF PELOPONNESE EL (TRIPOLIS) participant 413˙750.00
3    UNIVERSITY OF PLYMOUTH UK (PLYMOUTH) participant 398˙395.00
4    CGI NEDERLAND BV NL (ROTTERDAM) participant 365˙687.00
5    MATHEMA SRL IT (FIRENZE) participant 341˙312.00
6    ADITESS ADVANCED INTEGRATED TECHNOLOGY SOLUTIONS & SERVICES LTD CY (LEFKOSIA) participant 340˙625.00
7    SCORECHAIN SA LU (ESCH SUR ALZETTE) participant 324˙375.00
8    VRIJE UNIVERSITEIT BRUSSEL BE (BRUSSEL) participant 234˙375.00
9    HELLENIC TELECOMMUNICATIONS ORGANIZATION S.A. - OTE AE (ORGANISMOS TILEPIKOINONION TIS ELLADOS OTE AE) EL (Maroussi - Athens) participant 128˙112.00
10    MTN CYPRUS LIMITED CY (LEFKOSIA) participant 14˙887.00

Map

 Project objective

The CYBER-TRUST project aims to develop an innovative cyber-threat intelligence gathering, detection, and mitigation platform to tackle the grand challenges towards securing the ecosystem of IoT devices. The security problems arising from the flawed design of legacy hardware and embedded devices allows cyber-criminals to easily compromise them and launch large-scale attacks toward critical cyber-infrastructures. The proposed interdisciplinary approach will capture different phases of such emerging attacks, before and after known (even years old) or unknown (zero-day) vulnerabilities have been widely exploited by cyber-criminals to launch the attack. Emphasis is given on building a proactive cyber-threat intelligence gathering and sharing system to prevent the exploitation of zero-day vulnerabilities. This intelligence information will be used to maintain accurate vulnerability profiles of IoT devices, in accordance with data protection, privacy, or other regulations, and optimally alter their attack surface to minimise the damage from cyber-attacks. Novel technologies will be developed, based on distributed ledgers and blockchains, to monitor devices’ integrity state and network behaviour that will considerably increase the detection and response capabilities against targeted and interdisciplinary cyber-attacks. In the case of alleged malicious activity, tools for collecting and storing forensic evidence on a tamper-proof blockchain structure will be delivered, taking into account the specific needs of law enforcement agencies. Privacy-preserving network monitoring and advanced virtual reality-based visualisation techniques will be employed for quickly detecting botnets, DDoS attacks and other incidents. Relying on interdisciplinary research, an intelligent autonomous cyber-defence framework will be built for providing intelligent ways of isolating the devices under an attacker’s control (or infected) and effectively responding to and mitigating large-scale attacks.

 Deliverables

List of deliverables.
CYBER-TRUST end-user requirements Documents, reports 2020-04-24 06:26:55
Legal analysis of the use of evidence material Documents, reports 2020-04-24 06:26:54
Architecture and design specifications: initial Documents, reports 2020-04-24 06:26:54
CYBER-TRUST use case scenarios Documents, reports 2020-04-24 06:26:54
Threat actors’ attack strategies Documents, reports 2020-04-24 06:26:54
Threat sharing methods: comparative analysis Documents, reports 2020-04-24 06:26:54

Take a look to the deliverables list in detail:  detailed list of CYBER-TRUST deliverables.

 Publications

year authors and title journal last update
List of publications.
2019 5. Gkotsopoulou, O., Charalambous, E., Limniotis, K., Quinn, P., Kavallieros, D., Sargsyan, G., Shiaeles, S., Kolokotronis, N.
Data Protection by Design for Cybersecurity Systems in a Smart Home Environment
published pages: , ISSN: , DOI:
1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft) 2020-04-24
2019 Brotsis, S., Kolokotronis, N., Limniotis, K., Shiaeles, S., Kavallieros, D., Bellini, E., Pavue, C.
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
published pages: , ISSN: , DOI:
1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft) 2020-04-24
2019 Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Romain Griffiths
Secured by Blockchain: Safeguarding Internet of Things Devices
published pages: 28-34, ISSN: 2162-2256, DOI: 10.1109/mce.2019.2892221
IEEE Consumer Electronics Magazine 8/3 2020-04-24
2019 Costas Vassilakis
Blockchain technologies for leveraging security and privacy
published pages: 7, ISSN: 2585-3899, DOI: 10.12681/homvir.20188
Homo Virtualis 2/1 2020-04-24
2019 Baptista, I., Shiaeles, S., Kolokotronis, N.
A Novel Malware Detection System Based On Machine Learning and Binary Visualization
published pages: , ISSN: , DOI:
In * 2019 1st International Workshop on Data Driven Intelligence for Networks and Systems (DDINS) 2020-04-24

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "CYBER-TRUST" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "CYBER-TRUST" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.3.7.4.)

Cyber-MAR (2019)

Cyber preparedness actions for a holistic approach and awareness raising in the MARitime logistics supply chain

Read More  

FORESIGHT (2019)

Advanced cyber-security simulation platform for preparedness training in Aviation, Naval and Power-grid environments

Read More  

THREAT-ARREST (2018)

THREAT-ARREST Cyber Security Threats and Threat Actors Training - Assurance Driven Multi-Layer, end-to-end Simulation and Training

Read More