Skip to main content

Advanced cyber-security simulation platform for preparedness training in Aviation, Naval and Power-grid environments

Deliverables

Overall Legal and Ethical Framework

This deliverable will summarize the legal and regulatory issues that should be included in the development of the Cyber Range.

Outreach & communication plan and dissemination report (I)

1st version of a detailed DOC-plan and the related first activities report will define the target audience; the communication levels and the responsibilities attributed to each partner, indicators to measure the actions and methods for monitoring and reporting the actions. The report will also highlight, where, when, how and for whom the FORESIGHT project was presented, or the solution was demonstrated in dedicated events. These might include scientific conferences, developer workshops or symposia as well as large cybersecurity fairs and exhibitions.

Economic impact of cyber-attacks and risk mitigation

This report will present the framework for evaluating the economic impact of cyber-attacks. It will also present cyber-insurance as a risk mitigation method.

Models for Risk analysis and assessment

This report will present the framework for evaluating the economic impact of cyber-attacks. It will also present cyber-insurance as a risk mitigation method.

Outreach & communication plan and dissemination report (II)

2nd version of a detailed DOC-plan and the related first activities report will define the target audience; the communication levels and the responsibilities attributed to each partner, indicators to measure the actions and methods for monitoring and reporting the actions. The report will also highlight, where, when, how and for whom the FORESIGHT project was presented, or the solution was demonstrated in dedicated events. These might include scientific conferences, developer workshops or symposia as well as large cybersecurity fairs and exhibitions.

Report on existing cyber-security and training standards

In this report, an analysis of the methods and tools used for cyber security training and standardization will be provided.

Social, Ethical and Legal Report

This deliverable will define the potential societal, ethical and Legal concerns related to the project and the operation of the technologies and the platform.

Legal and Regulatory Report

This deliverable will summarize the legal and regulatory issues that should be included in the development of the Cyber Range.

State of the Art Scenario Report (I)

1st version of report on the state-of-the-art scenarios established for cyber-ranges, existing and upcoming technologies used in current cyber-ranges. The learning, gamification and training techniques will also be described and turned into a recommendation report for the design of the platform architecture.

Collaboration modules (I)

1st version of deliverable that will provide the software modules corresponding to T9.7 that are about the set of tools to be used for facilitating the collaboration between the trainees

Gamification and visualisation modules (I)

1st version of deliverable that will present the methods and associated software for (a) the gamification, and (b) the cyber-security visualisation modules for the training of security professionals; it corresponds to tasks T9.1 and T9.2.

Information gathering and sharing modules (I)

1st version of deliverable that will present the techniques and associated software for (a) the information extraction and gathering from online sources related to (0-day) vulnerabilities and threats, along with (b) the information sharing module; it corresponds to tasks T9.4 and T9.5.

Online Innovative Curricula tool (I)

1st verion of deliverable that delivers an online platform that will host the Innovative Curricula Framework. The deliverable will also illustrate the architecture and the design specifications that are selected to constitute the basis of the Innovative Curricula Framework platform – initial version; it consists of Part I – General architecture and Part II – Tools design specification. A first version is delivered on month M18 that is refined during the deployment of the platform on the pilot sites.

Report on the project website and the social media channels (II)

2nd version of the project website, social media channels will be up and running. Continuous updating will be done to guarantee that the website and the social media channels contain relevant data for interested stakeholders and are up-to-date. Furthermore, dissemination material such as factsheets, folders and roll-ups will be created and provided to the project partners.

Report on the project website and the social media channels (I)

1st version of the project website, social media channels will be up and running. Continuous updating will be done to guarantee that the website and the social media channels contain relevant data for interested stakeholders and are up-to-date. Furthermore, dissemination material such as factsheets, folders and roll-ups will be created and provided to the project partners.

Publications

Threat landscape for smart grid systems

Author(s): Christos-Minas Mathas, Konstantinos-Panagiotis Grammatikakis, Costas Vassilakis, Nicholas Kolokotronis, Vasiliki-Georgia Bilali, Dimitris Kavallieros
Published in: Proceedings of the 15th International Conference on Availability, Reliability and Security, 2020, Page(s) 1-7
DOI: 10.1145/3407023.3409229

Advanced metering infrastructures - security risks and mitigation

Author(s): Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles
Published in: Proceedings of the 15th International Conference on Availability, Reliability and Security, Issue ARES 2020, August 2020, 2020, Page(s) 1-8
DOI: 10.1145/3407023.3409312

Detection of advanced web bots by combining web logs with mouse behavioural biometrics

Author(s): Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilios Katos, Stefanos Vrochidis, Yiannis Kompatsiaris
Published in: Digital Threats: Research and Practice, 2021, ISSN 2692-1626
DOI: 10.1145/3447815

Utilising Flow Aggregation to Classify Benign Imitating Attacks

Author(s): Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures, Xavier Bellekens
Published in: Sensors, Issue 21/5, 2021, Page(s) 1761, ISSN 1424-8220
DOI: 10.3390/s21051761

A Review of Cyber-Ranges and Test-Beds: Current and Future Trends

Author(s): Ukwandu, Elochukwu; Farah, Mohamed Amine Ben; Hindy, Hanan; Brosset, David; Kavallieros, Dimitris; Atkinson, Robert; Tachtatzis, Christos; Bures, Miroslav; Andonovic, Ivan; Bellekens, Xavier
Published in: Sensors (Basel, Switzerland), Issue 1, 2020, ISSN 1424-8220
DOI: 10.3390/s20247148

inTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence

Author(s): Paris Koloveas, Thanasis Chantzios, Sofia Alevizopoulou, Spiros Skiadopoulos , Christos Tryfonopoulos 
Published in: Electronics, Issue 10/7, 2021, Page(s) 818, ISSN 2079-9292
DOI: 10.3390/electronics10070818

Human-Computer Interaction Considerations When Developing Cyber Ranges

Author(s): Lynsay A. SHEPHERD, Stefano DE PAOLI, Jim CONACHER
Published in: International Journal of Information Security and Cybercrime, Issue 9/2, 2020, Page(s) 28-32, ISSN 2285-9225
DOI: 10.19107/ijisc.2020.02.04