Skip to main content

SOC & Csirt Response to Attacks & Threats based on attack defence graphs Evaluation Systems


AI-based Attack Detection to Detect Advanced Threats

Integrated AI-based attack detection methods to detect advanced threats, along with documentation

Threat Identification and Threat Trend prediction – Initial Prototype

An initial prototype of the AI-based algorithms for threat identification and trend prediction with an API, including documentation

Initial ADG based Attack prototypes

Initial prototype versions of Infrastructure Modelling component and basic version of Attack Defence Graph analyser, along with documentation. The components will be limited towards application scenarios relevant for the first pilot iteration.

Initial version of the SOCCRATES Platform Orchestration, Reconfiguration and Front-end

This deliverable presents the initial version of the orchestration and integration component, reconfiguration component and web front-end component. We describe the communications they provide, functionalities they cover, plan for evaluation and integration in the SOCCRATES Platform.

Intermediate report on dissemination and standardization activities

Contains the progress of dissemination activities and standardization activities

Definition of the business model structure, inputs and interfaces

Specification of the model for quantification of business impact, including the concepts and structures of the model language.

System Architecture & Interface Specification – Initial version

This deliverable describes the initial version of the system architecture and interface specification. It will include a detailed description of the components and the interfaces

Dissemination plan

Contains all plans of SOCCRATES for dissemination at events and to stakeholders

SOCCRATES project handbook

A compact (online) handbook for participants in the project, that contains all SOCCRATES practical project information

Data management plan

A plan in which the way data is handled in the project is described, including responsibilities and measures to protect data

SOCCRATES use cases definition & pilot sites requirements

This deliverable will describe the use cases that are representative for the usage of the SOCCRATES platform. In addition, the pilot sites will be described and requirements for the deployment of the SOCCRATES platform at these pilot sites

SOCCRATES community platform

Online communication platform to communicate with and inform the SOCCRATES stakeholder group on progress of the project and relevant events

SOCCRATES public website

The project website (easy accessible) that contains actual information regarding the project and its events and where deliverables can be downloaded


Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs

Author(s): Andreas Gylling; Mathias Ekstedt; Zeeshan Afzal; Per Eliasson
Published in: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 2021
Publisher: IEEE
DOI: 10.1109/csr51186.2021.9527970

Subverting Network Intrusion Detection: Crafting Adversarial Examples Accounting for Domain-Specific Constraints

Author(s): Martin Teuffenbach, Ewa Piatkowska, Paul Smith
Published in: nternational IFIP Cross Domain (CD) Conference for Machine Learning & Knowledge Extraction (MAKE) 2020, August 25 2020, 2020, Page(s) 301-320
Publisher: Springer
DOI: 10.1007/978-3-030-57321-8_17

AI-based detection of DNS misuse for network security

Author(s): Irina Chiscop Francesca Soro Paul Smith
Published in: NativeNi '22: Proceedings of the 1st International Workshop on Native Network Intelligence, December 2022, 2022, Page(s) Pages 27–32
Publisher: ACM digital library
DOI: 10.1145/3565009.3569523

Security Countermeasures Selection Using theMeta Attack Language and ProbabilisticAttack Graphs

Published in: IEEE Access, Volume 10, 2021, Page(s) 89645 - 89662, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2022.3200601

An Attack Simulation Language for the IT Domain

Author(s): Sotirios Katsikeas, Simon Hacks, Pontus Johnson, Mathias Ekstedt, Robert Lagerström, Joar Jacobsson, Max Wällstedt, Per Eliasson
Published in: Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers, 12419, 2020, Page(s) 67-86, ISBN 978-3-030-62229-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-62230-5_4