Skip to main content

a cyberSecurity Platform for vIrtualiseD 5G cybEr Range services

Deliverables

Interim report on dissemination, communication, standardisation and exploitation

This deliverable will include all dissemination communication and standardisation activities that have been undertaken during the first two 2 years of the project and those still planned The reference tasks are Task 81 Task 82 and Task 83

Asset pricing and impact loss analysis: an empirical framework

This deliverable will report on the systems risk exposure under different scenarios as well as the interdependences and correlations between asset vulnerabilities The reference task is Task 53

Initial report on dissemination, communication, standardisation and exploitation

This deliverable will include all dissemination, communication and standardisation activities that have been undertaken, during the first twelve (12) months of the project, and those still planned. The reference tasks are Task 8.1, Task 8.2 and Task 8.3.

Report on connections with stakeholders and European CERTs/CSIRTs – initial version

This deliverable will be the initial version of the report on the progress and work of task 8.4.

Project handbook with strategic plan for quality assurance and risk management

This deliverable contains all the necessary information to support management of the project, with highlights on the procedures covering, the online collaboration for effective co-operation, project deliverables: production process, ensuring quality, how to store, how to review, monthly reporting of effort and progress and the mechanisms for working effectively. It will also contain the quality assurance and risk management plan. The reference tasks are Task 1.1, Task 1.2 and Task 1.3.

An empirical decision-support framework for econometric analysis of cyber risk and investment

This deliverable will report on the empirical framework that supports the CIC Component of SPIDER The reference task is Task 54

SPIDER ethical, privacy and legal requirements – final version

This deliverable will report the final version of the SPIDER’s ethical, privacy and legal requirements. The reference task is Task 2.2.

SPIDER ethical, privacy and legal requirements – initial version

This deliverable will constitute the initial report on SPIDER’s ethical, privacy and legal requirements. The reference task is Task 2.2.

Plans for dissemination, communication, standardisation and exploitation

A coordinated dissemination and communication plan will be defined in D8.1 and maintained/updated throughout the project. This document will describe how SPIDER will establish and follow highly effective dissemination and communication activities to promote the project and will record how the results are being exploited. It will be written primarily as a guide for the project partners and for the key stakeholders of our intended dissemination and promotion activities and covers four main aspects: • The SPIDER dissemination and communication/promotion goals. • The SPIDER strategy: i.e., how the project will disseminate and promote project activities and work. • A plan of the specific promotional activities that will evolve in line with the progress of the project • A description of how the project can measure the effectiveness of its dissemination and communication The report will be updated through D8.2 and D8.3. The reference tasks are Task 8.1, Task 8.2 and Task 8.3.

Project website

The SPIDER website will be launched at the start of the project. The website will provide detailed information about the project objectives and activities. The website will have two sections: public and private. The public part will be open to the general public and will be viewable by anyone with access to Internet. The private part will be regularly updated to provide latest project activities and overall progress and will be accessible only to consortium members. The website will be maintained by the PM. The reference task is the Task 1.1.

Publications

A Digital Twin for the 5G Era: the SPIDER Cyber Range

Author(s): Filippo Rebecchi; Antonio Pastor; Alberto Mozo; Chiara Lombardo; Roberto Bruschi; lias Aliferis; Roberto Doriguzzi-Corin; Panagiotis Gouvas; Antonio Alvarez Romero; Anna Angelogianni; Ilias Politis; Christos Xenakis
Published in: Twinnets 22, 2, 2022
Publisher: tbc
DOI: 10.5281/zenodo.6347532

A Digital Twin Network for Security Training in 5G Industrial Environments

Author(s): S. Vakaruk, A. Mozo, A. Pastor and D. R. López
Published in: 2021 IEEE 1st International Conference on Digital Twins and Parallel Intelligence (DTPI), 2021, ISBN 978-1-6654-3337-2
Publisher: IEEE
DOI: 10.1109/dtpi52967.2021.9540146

Validation of IaaS-based Technologies for 5G-Ready Applications Deployment

Author(s): Roberto Bruschi, Franco Davoli, Fernando Díáz Bravo, Chiara Lombardo, Sergio Mangialardi, & Jane Frances Pajo
Published in: EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EuCNC 2020), , 2020
Publisher: IEEE
DOI: 10.5281/zenodo.4294557

The SPIDER Cyber Security Investment Component (CIC)

Author(s): Maria Tsiodra; Michail Chronopoulos; Matthias Ghering; Eirini Karapistoli; Neofytos Gerosavva; Nicolas Kylilis
Published in: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 1, 2021
Publisher: IEEE
DOI: 10.1109/CSR51186.2021.9527924

Unveiling the user requirements of a cyber range for 5G security testing and training

Author(s): Anna Angelogianni; Ilias Politis; Pier Luigi Polvanesi; Antonio Pastor; Christos Xenakis
Published in: 2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2021, ISBN 978-1-6654-1779-2
Publisher: IEEE
DOI: 10.1109/camad52502.2021.9617776

"Debunking the ""Green"" NFV Myth: An Assessment of the Virtualization Sustainability in Radio Access Networks"

Author(s): Raffaele Bolla, Roberto Bruschi, Franco Davoli, Chiara Lombardo, & Jane Frances Pajo
Published in:  IEEE Conference on Network Softwarization (NetSoft 2020), 2020
Publisher: IEEE
DOI: 10.5281/zenodo.4294562

LoMM: a Monitoring and Management Platform for LoRaWAN Experimentation

Author(s): Cristina Emilia Costa; Marco Centenaro; Roberto Riggio
Published in:  IEEE International Conference on Communications (ICC2020),, 2020
Publisher: IEEE
DOI: 10.5281/zenodo.4032464

Evaluating Urban Network Activity Hotspots through Granular Cluster Analysis of Spatio-Temporal Data

Author(s): J. F. Pajo, G. Kousiouris, D. Kyriazis, R. Bruschi and F. Davoli
Published in: 17th International Conference on Network and Service Management (CNSM), 2021, 2021, Page(s) 417-421, ISBN 978-3-903176-36-2
Publisher: IEEE
DOI: 10.23919/cnsm52442.2021.9615584

A cyberSecurity Platform for vIrtualiseD 5G cybEr Range services (SPIDER)

Author(s): Neofytos Gerosavva; Manos Athanatos; Christoforos Ntantogian; Christos Xenakis; Cristina Costa; Alberto Mozo; Matthias Ghering; Angela Brignone
Published in: The 14th International Conference on Research Challenges in Information Science - 22 - 25 September 2020, 2021
Publisher: Zenodo
DOI: 10.5281/zenodo.4471360

Enabling Edge Computing Deployment in 4G and Beyond

Author(s): Roberto Bruschi, Franco Davoli, Guerino Lamanna, Chiara Lombardo, Sergio Mangialardi, & Jane Frances Pajo.
Published in: IEEE Conference on Network Softwarization (NetSoft 2020), , 2020
Publisher: IEEE
DOI: 10.5281/zenodo.4294539

Enabling Edge Computing Deployment in 4G and Beyond

Author(s): Roberto Bruschi; Franco Davoli; G. Lamanna; Chiara Lombardo; Sergio Mangialardi; Jane Frances Pajo
Published in: 2020 6th IEEE Conference on Network Softwarization (NetSoft), 2, 2020
Publisher: IEEE
DOI: 10.1109/netsoft48620.2020.9165384

The SPIDER concept: A Cyber Range as a Service platform

Author(s): Christos Xenakis, Anna Angelogianni, Eleni Veroni, Eirini Karapistoli, Matthias Ghering, Neofytos Gerosavva, … Antonio Pastor. (2020).
Published in: EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EuCNC 2020), , 2020
Publisher: Zenodo
DOI: 10.5281/zenodo.4030473

SPIDER: ML Applied to 5G Network Cyber Range

Author(s): Vakaruk, Stanislav; Mozo, Alberto; Pastor, Antonio
Published in: European Conference on Networks and Communications & 6G Summit (EuCNC 2021), 2, 2021
Publisher: IEEE
DOI: 10.5281/zenodo.5647899

Dynamics of Fourier Modes in Torus Generative Adversarial Networks

Author(s): Ángel González-Prieto; Alberto Mozo; Edgar Talavera; Sandra Gómez-Canaval
Published in: Mathematics, 1, 2021, ISSN 2227-7390
Publisher: MDPI
DOI: 10.3390/math9040325

On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats

Author(s): ANNA ANGELOGIANNI; ILIAS POLITIS; FARNAZ MOHAMMADI; CHRISTOS XENAKIS
Published in: IEEE Access, IEEE Access 16 December 2020, 2020, Page(s) 1-1, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/ACCESS.2020.3045322

Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks

Author(s): Mozo, Alberto; González-Prieto, Ángel; Pastor, Antonio; Gómez-Canaval, Sandra; Talavera, Edgar
Published in: Scientific Reports, 1, 2022, ISSN 2045-2322
Publisher: Nature Publishing Group
DOI: 10.1038/s41598-022-06057-2

NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation

Author(s): Christoforos Ntantogian, Panagiotis Bountakas, Dimitris Antonaropoulos, Constantinos Patsakis, Christos Xenakis
Published in: Journal of Information Security and Applications, Volume 58, 102752, 2021, ISSN 2214-2126
Publisher: ELSEVIER
DOI: 10.1016/j.jisa.2021.102752

Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware.

Author(s): Eva Papadogiannaki; Sotiris Ioannidis
Published in: Sensors 2021, 21(4), 1140, 3, 2021, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21041140

[m]allotROPism: a metamorphic engine for malicious software variation development

Author(s): Christos Lyvas; Christoforos Ntantogian; Christos Xenakis
Published in: International Journal of Information Security volume, 3, 2021, Page(s) 61-78, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-021-00541-y

Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning

Author(s): Antonio Pastor, Alberto Mozo, Stanislav Vakaruk, Daniele Canavese, Diego R. Lopez, Leonardo Regano, Sandra Gomez-Canaval, Antonio Lioy
Published in: IEEE Access, 8, 2020, Page(s) 158036-158055, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/ACCESS.2020.3019658

On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats

Author(s): Angelogianni, Anna; Politis, Ilias; Mohammadi, Farnaz; Xenakis, Christos
Published in: IEEE Access, Vol 8, 1, 2020, Page(s) 224677-224701, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2020.3045322

ANNs Going Beyond Time Series Forecasting: An Urban Network Perspective

Author(s): Jane Frances Pajo; George Kousiouris; Dimosthenis Kyriazis; Roberto Bruschi; Franco Davoli
Published in: IEEE Communications Magazine ( Volume: 59, Issue: 5, May 2021, 1, 2021, Page(s) 88-94, ISSN 0163-6804
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/mcom.001.2000990