Skip to main content

Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things

Deliverables

Dissemination activities report (1st Report)

This biannual report detail the dissemination activities carried out during the reporting period, assess their effectiveness, recommend adjustments, and plan for further actions.

Regulatory framework analysis

This report will analyse the regulatory framework that is applicate in the project regarding personal data collection and processing and will present suitable technical measures that are meeting all the legal requirements.

State-of-the-art on proactive technologies

This report will provide an overview of the state-of-the-art in the areas considered in the work package. Recommendations on the approaches and methods that are well-suited for the CYBER-TRUST platform will be made.

Threat actors’ attack strategies

The report will provide a detailed modelling of the possible attack strategies used by threat actors of particular profiles in selected types of cyber-attacks targeting at devices, networks and CIIs.

Threat landscape: trends and methods

In this report, an analysis of the methods and tools used by threat actors, as well as, the approaches employed for their detection and mitigation will be provided; technical reports and articles published in journals/conferences will be included

Architecture and design specifications: initial

The deliverable illustrates the architecture and the design specifications that are selected to constitute the basis of the CYBER-TRUST platform – initial version; it consists of Part I – General architecture and Part II – Tools design specifications.

Dissemination activities report (3rd Report)

This biannual report detail the dissemination activities carried out during the reporting period, assess their effectiveness, recommend adjustments, and plan for further actions.

Privacy-preserving profiling: security and privacy

The report will describe the approach taken by the project for profiling devices and issues related to security and privacy. A cross-evaluation of current and new methods for SMC and pseudonymization will be provided

Threat sharing methods: comparative analysis

The document will conduct an evaluation of existing industry-wide vulnerability reporting and sharing frameworks and provide recommendations on the approach to be followed in the Cyber-Trust platform.

CYBER-TRUST distributed ledger architecture

This report will present in detail the foreseen architecture to provide the different services for the CYBER-TRUST platform.

Dissemination activities report (2nd Report)

This biannual report detail the dissemination activities carried out during the reporting period, assess their effectiveness, recommend adjustments, and plan for further actions.

Legal analysis of the use of evidence material

This deliverable will analyse the legal requirements that are applicate on the collection and processing of evidence for criminal investigations and related matters.

Dissemination and use plan

This report will establish in detail the project’s dissemination strategy, following the iterative procedure described in Section 2.2.2, along with the mechanism to evaluate its effectiveness. It will also indicate venues to submit scientific results and give directions for liaising with cyber-security stakeholders, standardisation bodies, forums, and other bodies.

Trust management service: security and privacy

The report will describe the TMS service of the platform. A thorough analysis of its security against a number of attacks will also be given.

Dissemination activities report (4th Report)

This biannual report detail the dissemination activities carried out during the reporting period, assess their effectiveness, recommend adjustments, and plan for further actions.

Distributed ledger state-of-the-art report

This report will provide an overview of the state-of-the-art in distributed ledger technology and areas like modelling, implementation, security, consensus, etc.

State-of-the-art on profiling, detection and mitigation

This report will provide an overview of the state-of-the-art in the areas considered in the work package. Recommendations on the approaches and methods that are well-suited for the CYBER-TRUST platform will be made.

Legal and ethical recommendations

This report will conclude on concrete recommendations for the design of the CYBER-TRUST platform and its tools to be developed in other technical work packages.

CYBER-TRUST end-user requirements

This report will describe the methodology used in order to extract, categorise and prioritise the end-user requirements, and their subsequent translation into technical requirements. It will be revised on month M14 following the end-user feedback during the design phase.

CYBER-TRUST blockchain security analysis (1st Report)

This report will present in detail the security framework adopted in the distributed ledger of the project. A first version is delivered on M24 with the results of the security analysis of the DLT framework. An updated version will be delivered on month M30 including postquantum considerations and research results on formal security models.

Cyber-threat intelligence sharing

The report will describe the architecture of the cyber-threat information sharing tool, including the design of the enriched VDB.

CYBER-TRUST use case scenarios

The report will document the use case scenarios that will guide the development of the services and functionalities implemented by the CYBER-TRUST platform.

CYBER-TRUST proactive technology tools

These are the software tools that will implement the various algorithms, methods, tools, systems, etc. of the work package. A first version is delivered on month M21 that is refined during the deployment of the platform on the pilot sites.

CYBER-TRUST network tools

The deliverable will release a prototype of tools for the detection and mitigation of advanced network attacks, including network forensic aspects. A first version is delivered on month M21 that is refined during the deployment of the platform on the pilot sites.

CYBER-TRUST authority and publishing management

This includes a DLT smart-contract with reference client implementation and the documentation. It will enable CYBER-TRUST users to manage the acceptance and evocation of a new manufacturer authority on an IoT device class that enables publishing authoritative data for the device, i.e. default configuration, description of usage, firmware download URL, etc.

CYBER-TRUST visualisation tool

The deliverable will release a prototype of an advanced visualisation tool (VR/Flat based) for understanding and visually detecting cyber-threats. A first version is delivered on month M21 that is refined during the deployment of the platform on the pilot sites.

CYBER-TRUST device tools

The deliverable delivers a prototype of tools for the detection and remediation of advanced device attacks, including device forensic aspects. A first version is delivered on month M21 that is refined during the deployment of the platform on the pilot sites.

CYBER-TRUST information and evidence storage

This will deliver a deployable demo DLT platform, a smart-contract for registering IoT device information and a reference client implementation, with a forensic tool to search for evidence, documentation for the components. A first version is delivered on month M21 that is refined during the deployment of the platform on the pilot sites.

CYBER-TRUST project website

This is the website dedicated to the project activities, providing services, such as mailing lists, RSS feeds, discussion forums/blogs, and webcasts/podcasts.

Searching for OpenAIRE data...

Publications

WiP: Are Cracked Applications Really Free? An Empirical Analysis on Android Devices

Author(s): Konstantinos-Panagiotis Grammatikakis, Angela Ioannou, Stavros Shiaeles, Nicholas Kolokotronis
Published in: 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2018, Page(s) 730-735
DOI: 10.1109/dasc/picom/datacom/cyberscitec.2018.00127

WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management

Author(s): Keltoum Bendiab, Nicholas Kolokotronis, Stavros Shiaeles, Samia Boucherkha
Published in: 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2018, Page(s) 724-729
DOI: 10.1109/dasc/picom/datacom/cyberscitec.2018.00126

Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis

Author(s): Muhammad Ali, Stavros Shiaeles, Maria Papadaki, Bogdan V Ghita
Published in: 2018 Global Information Infrastructure and Networking Symposium (GIIS), 2018, Page(s) 1-5
DOI: 10.1109/giis.2018.8635598

Detection of LDDoS Attacks Based on TCP Connection Parameters

Author(s): Michael Siracusano, Stavros Shiaeles, Bogdan Ghita
Published in: 2018 Global Information Infrastructure and Networking Symposium (GIIS), 2018, Page(s) 1-6
DOI: 10.1109/giis.2018.8635701

Data Protection by Design for Cybersecurity Systems in a Smart Home Environment

Author(s): 5. Gkotsopoulou, O., Charalambous, E., Limniotis, K., Quinn, P., Kavallieros, D., Sargsyan, G., Shiaeles, S., Kolokotronis, N.
Published in: 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), 2019

A Novel Malware Detection System Based On Machine Learning and Binary Visualization

Author(s): Baptista, I., Shiaeles, S., Kolokotronis, N.
Published in: In * 2019 1st International Workshop on Data Driven Intelligence for Networks and Systems (DDINS), 2019

Blockchain Solutions for Forensic Evidence Preservation in IoT Environments

Author(s): Brotsis, S., Kolokotronis, N., Limniotis, K., Shiaeles, S., Kavallieros, D., Bellini, E., Pavue, C.
Published in: 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), 2019

Blockchain technologies for leveraging security and privacy

Author(s): Costas Vassilakis
Published in: Homo Virtualis, Issue 2/1, 2019, Page(s) 7, ISSN 2585-3899
DOI: 10.12681/homvir.20188

Secured by Blockchain: Safeguarding Internet of Things Devices

Author(s): Nicholas Kolokotronis, Konstantinos Limniotis, Stavros Shiaeles, Romain Griffiths
Published in: IEEE Consumer Electronics Magazine, Issue 8/3, 2019, Page(s) 28-34, ISSN 2162-2256
DOI: 10.1109/mce.2019.2892221