Deliverables Demonstrators, pilots, prototypes (3) Hybrid Threat Intelligence Framework- First release D51 The integrated data analytics engine based on ML and DL for threat detection and classification first release accompanied by reports describing the implementation and usage guidelines All WP5 tasks contribute to this deliverable T53 and T52 for threat detection and classification T54 for remediation activities and T51 for traffic accumulation and preprocessing PALANTIR Secure Services Ecosystem - First release A set of software prototypes of the trusted virtualised security services to be used in PALANTIR First release accompanied by reports describing the implementation and usage guidelines Linked with all WP3 tasks mainly with T32 services orchestration T31 individual security services T34 service catalogue and T33 risk calculation mechanisms Dashboard, Reporting and Threat Sharing Platform - First release D41 A set of software prototypes of the Security Dashboard for interacting with the PALANTIR framework reporting and sharing threat intelligence information First release accompanied by reports describing the implementation and usage guidelinesPrimarily linked with T41 for the dashboard functionalities and also with T43 service matching and accounting Documents, reports (8) Integration & Validation Report: Use case results and playbook (first prototype) D61 Report describing the integrated Prototype of the PALANTIR framework as well as the evaluationverification results on the use cases first prototypeLinked with T61 integration and testing but also with the 3 UCs T62 T63 T64 Trust, Attestation and Verification Framework -Specifications of first release D42 The set of reports describing the implementation and usage guidelines for attesting the integrity of hardware and software modulesSpecifications of first release Linked mainly with T44 different attestation mechanisms and with T42 fault management Integration & Validation Report: Use case results and playbook (final prototype) D62 Report describing the integrated Prototype of the PALANTIR framework as well as the evaluationverification results on the use cases final prototype Linked with T61 integration and testing but also with the 3 UCs T62 T63 T64 Trust, Attestation and Verification Framework -Specifications of second release D44 The set of reports describing the implementation and usage guidelines for attesting the integrity of hardware and software modules Linked mainly with T44 different attestation mechanisms and with T42 fault management Threat analysis & AS-based risk assessment D22 Comprehensive definition of the relevant attack classes entryexit points channels data stores etc in SDNNFV and cloudnative deploymentsLinked with T24 Risk Reduction measures D24 Highlevel identification of measures to reduce security risks in service oriented infrastructures Linked with T24 Requirements & high-level design - Final D23 Systemlevel requirements for the PALANTIR framework and highlevel technical design and specifications Final version Primarily linked with T21 functional requirements also with T22 business and legal requirements T23 UC requirements Requirements & high-level design - Interim D21 System level requirements for PALANTIR framework highlevel designs and specifications interim version Primarily linked with T21 functional requirements also with T22 business and legal requirements T23 UC requirements Websites, patent fillings, videos etc. (1) Project website & social media accounts D72 The project public website and the established projects accounts on the selected social media platforms Linked with T73 Digital presence Publications Conference proceedings (17) syslrn: Learning What to Monitor for Efficient Anomaly Detection Author(s): Davide Sanvito; Giuseppe Siracusano; Sharan Santhanam; Roberto Gonzalez; Roberto Bifulco Published in: ACM EuroMLSys 2022, Issue 28, 2022, ISBN 978-1-4503-9254-9 Publisher: ACM EuroMLSys 2022 DOI: 10.1145/3517207.3526979 A data infrastructure for heterogeneous telemetry adaptation. Application to Netflow-based cryptojacking detection. Author(s): Alejandro A. Moreno-Sancho, Antonio Pastor, Ignacio D. Martinez-Casanueva, Daniel González-Sánchez, Luis Bellido Triana Published in: International Conference on Intelligence in Next Generation Networks (ICIN), 2023, Page(s) 105-112, ISBN 979-8-3503-9804-5 Publisher: IEEE DOI: 10.1109/icin56760.2023.10073490 Prediphant: Short Term Heavy User Prediction Author(s): Davide Sanvito; Giuseppe Siracusano; Roberto Gonzalez; Roberto Bifulco Published in: IEEE/IET CSNDSP 2022, Issue 26, 2022, ISBN 978-1-6654-1044-1 Publisher: IEEE/IET DOI: 10.1109/csndsp54353.2022.9907909 A Cost-Effective Security Framework to protect micro enterprises: PALANTIR e-commerce use case Author(s): Izidor Mlakar; Primož Jeran; Valentino Šafran; Vangelis Logothetis Published in: Issue 1, 2021 Publisher: IEEE DOI: 10.1109/ISDFS52919.2021.9486359 Model-Driven Network Monitoring Using NetFlow Applied to Threat Detection Author(s): Daniel González-Sánchez, Ignacio D. Martinez-Casanueva, Antonio Pastor, Luis Bellido Triana, Cristina Pinar Muñoz Zamarro, Alejandro Antonio Moreno Sancho, David Fernández Cabronero, Diego Lopez Published in: IEEE Netsoft (SecSoft workshop), 2022, Page(s) 450-455, ISBN 978-1-6654-0694-9 Publisher: IEEE DOI: 10.1109/netsoft54395.2022.9844107 Re-architecting Traffic Analysis with Neural Network Interface Cards Author(s): Giuseppe Siracusano; Salvator Galea; Davide Sanvito; Mohammad Malekzadeh; Gianni Antichi; Paolo Costa; Hamed Haddadi; Roberto Bifulco Published in: USENIX NSDI 2022, Issue 32, 2022, ISBN 978-1-939133-27-4 Publisher: USENIX DOI: 10.5281/zenodo.6446562 Provision of Security-as-a-Service (SecaaS) in Lightweight Scenarios Author(s): Antonio López Martínez; Mattia Zago; Manuel Gil Pérez Published in: VII Jornadas Nacionales en Investigación en Ciberseguridad (JNIC), Issue 12, 2022, Page(s) 327-330, ISBN 978-84-88734-13-6 Publisher: Fundación Tecnalia Research and Innovation DOI: 10.5281/zenodo.6856500 PALANTIR: Zero-Trust Architecture for Managed Security Service Provider Author(s): Maxime Compastié; Silvia Sisinni; Supreshna Gurung; Carolina Fernández; Ludovic Jacquin; Izidor Mlakar; Valentino Šafran; Antonio Lioy; Ignazio Pedone Published in: Proceedings of the 29th Computer & Electronics Security Application Rendezvous (C&ESAR): Ensuring Trust in a Decentralized World, Issue 16, 2023, ISSN 1613-0073 Publisher: CEUR Workshop Proceedings DOI: 10.5281/zenodo.7545474 A cost-effective security framework to protect micro enterprises: PALANTIR e-commerce use case Author(s): Izidor Mlakar, Primož Jeran, Valentino Šafran, Vangelis Logothetis Published in: ISDFS 2021, 2021, ISBN 978-1-6654-4481-1 Publisher: IEEE DOI: 10.1109/isdfs52919.2021.9486359 AISGA: Multi-Objective Parameters Optimization for Countermeasures Selection through Genetic Algorithm Author(s): Pantaleone Nespoli; Félix Gómez Mármol; Georgios kambourakis Published in: Issue 3, 2021 Publisher: ACM DOI: 10.1145/3465481.3470074 Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized Enterprises Author(s): Evangelos Mantas, Dimitris Papadopoulos, Carolina Fernandez, Nil Ortiz, Maxime Compastie, Antonio López Martínez, Manuel Gil Pérez, Akis Kourtis, George Xylouris, Izidor Mlakar, Stylianos Tsarsitalidis, Dimitrios Klonidis, Ignazio Pedone, Daniele Canavese, Gregorio Martínez Pérez, Davide Sanvito, Vangelis Logothetis, Diego Lopez, Antonio Pastor, Antonio Lioy, Ludovic Jacquin, Roberto Bifulco, Published in: IEEE Meditcom, 2021, ISBN 978-1-6654-4505-4 Publisher: IEEE DOI: 10.1109/meditcom49071.2021.9647609 Using Anomaly Detection Techniques for Securing 5G Infrastructure and Applications Author(s): Athanasios Priovolos; Dimitrios Lioprasitis; Georgios Gardikis; Socrates Costicoglou Published in: IEEE Meditcom, Issue 3, 2021 Publisher: IEEE DOI: 10.1109/MeditCom49071.2021.9647668 PALANTIR demo: leveraging SecaaS model for managing threats in industrial environments Author(s): Carolina Fernández, Davide Sanvito, Orestis Kompougias, Valentino Safran, Maxime Compastié, Ignazio Pedone, Antonio López Martínez, Manuel Gil Pérez, Akis Kourtis, George Xylouris, Izidor Mlakar, Stylianos Tsarsitalidis, Dimitrios Klonidis, Daniele Canavese, Vangelis Logothetis, Diego Lopez, Antonio Pastor, Antonio Lioy, Ludovic Jacquin, Supreshna Gurung, Roberto Bifulco, Athanasios Priovolos Published in: IEEE Meditcom, 2022, Page(s) 82-85, ISBN 978-1-6654-9825-8 Publisher: IEEE DOI: 10.1109/meditcom55741.2022.9928648 Poster: MUSTARD - Adaptive Behavioral Analysis for Ransomware Detection Author(s): Davide Sanvito; Giuseppe Siracusano; Roberto González; Roberto Bifulco Published in: ACM CCS 2022, Issue 25, 2022, Page(s) 3455–3457, ISBN 978-1-4503-9450-5 Publisher: ACM DOI: 10.1145/3548606.3563529 A Model for Automated Cybersecurity Threat Remediation and Sharing Author(s): Francesco Settanni; Leonardo Regano; Cataldo Basile; Antonio Lioy Published in: 2023 IEEE 9th International Conference on Network Softwarization (NetSoft), Issue 20, 2023 Publisher: IEEE DOI: 10.1109/NetSoft57336.2023.10175486 IoT Botnet Detection on Flow Data using Autoencoders Author(s): Orestis Kompougias, Dimitris Papadopoulos, Evangelos Mantas, Antonis Litke, Nikolaos Papadakis, Dimitris Paraschos, Akis Kourtis, George Xylouris Published in: IEEE Meditcom, 2021 Publisher: IEEE DOI: 10.1109/meditcom49071.2021.9647639 A Review of SSH Botnet Detection in Initial Stages of Infection: A Machine Learning-Based Approach Author(s): J.T. Martínez Garre, M. Gil Pérez, A. Ruiz Martínez Published in: Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021, ISBN 978-84-9044-463-4 Publisher: Ediciones de la Universidad de Castilla-La Mancha DOI: 10.18239/jornadas_2021.34.02 Peer reviewed articles (11) A Novel Machine Learning-Based Approach for the Detection of SSH Botnet Infection Author(s): J.T. Martínez Garre, M. Gil Pérez, A. Ruiz Martínez Published in: Future Generation Computer Systems, 2021, ISSN 0167-739X Publisher: Elsevier BV DOI: 10.1016/j.future.2020.09.004 PALANTIR: An NFV-Based Security-as-a-Service Approach for Automating Threat Mitigation Author(s): Maxime Compastié, Antonio López Martínez, Carolina Fernández, Manuel Gil Pérez, Stylianos Tsarsitalidis, George Xylouris, Izidor Mlakar, Michail Alexandros Kourtis, and Valentino Šafran Published in: "MDPI Sensors, Special Issue ""Security and Privacy in Cloud Computing Environment""", 2023, ISSN 1424-8220 Publisher: Multidisciplinary Digital Publishing Institute (MDPI) DOI: 10.3390/s23031658 A novel architecture to virtualise a hardware-bound trusted platform module Author(s): Marco De Benedictis, Ludovic Jacquin, Ignazio Pedone, Andrea Atzeni, Antonio Lioy Published in: Future Generation Computer Systems, 2023, ISSN 0167-739X Publisher: Elsevier BV DOI: 10.1016/j.future.2023.08.012 Early DGA-based botnet identification: pushing detection to the edges Author(s): Mattia Zago; Manuel Gil Pérez; Gregorio Martínez Pérez Published in: Future Generation Computer Systems, Issue 1, 2021, ISSN 1386-7857 Publisher: Baltzer Science Publishers B.V. DOI: 10.1007/s10586-020-03213-z Data set and machine learning models for the classification of network traffic originators Author(s): Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Ciravegna, Gabriele; Lioy, Antonio Published in: Computers & Electrical Engineering, Issue 25, 2022, ISSN 2352-3409 Publisher: Elsevier BV DOI: 10.1016/j.dib.2022.107968 Early DGA-Based Botnet Identification: Pushing Detection to the Edges Author(s): M. Zago, M. Gil Pérez, G. Martínez Pérez Published in: Cluster Computing, 2021, ISSN 1386-7857 Publisher: Baltzer Science Publishers B.V. DOI: 10.1007/s10586-020-03213-z Adaptive Vulnerability-Based Risk Identification Software with Virtualization Functions for Dynamic Management Author(s): A. García Pérez, A. López Martínez, M. Gil Pérez Published in: Journal of Network and Computer Applications, 2023, ISSN 1084-8045 Publisher: Academic Press DOI: 10.1016/j.jnca.2023.103728 A novel Machine Learning-based approach for the detection of SSH botnet infection Author(s): José Tomás Martínez Garre; Manuel Gil Pérez; Antonio Ruiz-Martínez Published in: Future Generation Computer Systems, Issue 3, 2021, ISSN 0167-739X Publisher: Elsevier BV DOI: 10.1016/j.future.2020.09.004 A comprehensive review of the state of the art on security and privacy issues in Healthcare Author(s): Antonio López Martínez, Manuel Gil Pérez, Antonio Ruiz Martínez Published in: ACM Computer Surveys, 2022, ISSN 0360-0300 Publisher: Association for Computing Machinary, Inc. DOI: 10.1145/3571156 A Bio-Inspired Reaction Against Cyberattacks: AIS-Powered Optimal Countermeasures Selection Author(s): P. Nespoli, F. Gómez Mármol, J. Maestre Vidal Published in: IEEE Access, 2021, ISSN 2169-3536 Publisher: Institute of Electrical and Electronics Engineers Inc. DOI: 10.1109/access.2021.3074021 Encryption-agnostic classifiers of traffic originators and their application to anomaly detection Author(s): Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Ciravegna, Gabriele; Lioy, Antonio Published in: Data in Brief, Issue 30, 2022, ISSN 0045-7906 Publisher: Pergamon Press Ltd. DOI: 10.1016/j.compeleceng.2021.107621 Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available