Cyber-Trust is committed to the Open Source community

Visit our Open Source Repository

Visit our Repo

Read through Trends & Reports on Cyber-Security, our public project  deliverables and also the project publications…

Visit our reading corner

Read more

1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures. The main purpose of the SecSoft workshop is to integrate the “Security, Safety, Trust and Privacy support in virtualized environments” conference topic.

Coorganising SecSoft2019 as part of the IEEE NetSoft Paris France – CALL FOR PAPER SUBMISSIONS

Read more

Develop an innovative cyber-threat intelligence gathering, detection, and mitigation

innovative cyber-threat platform

Our Test Cases
CyberTrust will be carrying our two main pilots

Internet Service Providers (ISPs) offer advanced M2M solutions to commercial customers and plans on expanding to IoT services for smart metering, smart homes and smart buildings, as a great shift towards these IoT markets is expected in Cyprus in the near future. In the first validation period, running for four months, the platform will be validated by an ISP provider.

The ISP provider will test the platform on the use case categories: (a) zero-day vulnerability discovery, (b) monitoring and vulnerability assessment, (c) network-level attacks, and (d) device-level attacks.

Communications Provider

Primary Pilot

The Hellenic Cyber-Crime Division with its HQs established in Athens, since 2004, when the unit was upgraded to a full department of the Hellenic Police, it has resolved over 6,000 cases of fraud, extortion and child abuse, while several resolved cases were only partially committed in Greece.

KEMEA and the Hellenic Cyber-Crime Division, using the data produced by the first pilot, will test the platform regarding its capabilities w.r.t. (e) forensic evidence collection.

Hellenic Police

Secondary Pilot
What are the platform aspects...
Zero-day vulnerabilities, threat sharing, network monitoring, blockchain, forensic evidence, device tampering, DDoS attacks, detection and mitigation, reputation systems, data protection and privacy.

Statistical & Signature based detection

Real time DDOS and RoQ attack detection Deep packet inspection Protocol analysis Anomaly detection

IoT Device Tampering Detection & Remediation

Autonomous health monitoring of IoT devices Tampering attempts Abnormal payload and traffic

Cyber-threat Intelligence Gathering & Sharing System

Novel approach: Deep and machine learning techniques Game-theoretic framework to provide recommendations for IoT service providers based on the information regarding vulnerabilities Game-theory and machine learning to create patterns and predict the evolution of malwares and botnets Intelligence gathering from: Clearnet Deep and dark web Intelligence sharing to: Organisations SOC teams Security experts LEAs CERTs

Cyber-Trust Blockchain

Provide trusted transaction processing and coordination between IoT devices Ensure security: Identity Data Communication Safeguarding critical files and software binaries Minimize the damage caused by tampered devices and malware as well as single points of failure Collection and storing of forensic evidence

IoT device Profiling

Develop a privacy-preserving IoT device (vulnerability) profiling framework, so that any communications with high risk devices are subject to more thorough analysis.

Self-adaptive Virtual 3D environment

The flat representation (on the screen) may provide synthetic information about the status of the IoT network that can be used for the monitoring phase. It will use BODY OCULUS (or similar viewers) and body movement(e.g. hand gestures) to navigate and inspect the network. Through the VR mode it will be possible to cover more network area per analyst and see more in less time; it will also allow to see panels of related information surrounding the operator in a…

Contribute to the development of CYBER-TRUST Platform

We would like to welcome you to the world of CYBER-TRUST «Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for Trusted Internet of Things» and ask your precious help and attention for the second (2nd ) round of CYBER-TRUST QUESTIONNAIRES.   CYBER-TRUST is a H2020 European project which goal is to develop an innovative platform cyber-threat intelligence gathering, detection, and mitigation platform to tackle the grand challenges towards securing the ecosystem of IoT devices. The security problems arising from the flawed design of legacy hardware and embedded devices allows cyber-criminals to easily compromise them and launch large-scale…

0
Read More

Organisation of the IEEE Services Workshop ( Cyber Security and Resilience in the Internet of Things )

Our partners from CSCAN and UOP will participate on the 1st IEEE Services Workshop on Cyber Security and Resilience in the Internet of Things is a joint event to the IEE World Congress (IEEE Services 2019) that will be held in Milan, Italy on July 8-13, 2019. The purpose of this Workshop is to bring together students, researchers, security experts and IT experts from Industry on areas under consideration by Cyber-Trust. It mainly focuses on both the theoretical & practical…

0
Read More

Planned study visit at the EU Agency for Fundamental Rights (FRA)

The European Union Agency for Fundamental Rights (FRA) is the EU’s centre of fundamental rights expertise where our partners from VUB will participate. Olga Gkotsopoulou during her study visit will contribute with her research in privacy and data protection, in particular with relation to WP3, to the drafting of the first “Handbook on European law relating to cybercrime and fundamental rights” (https://fra.europa.eu/en/project/2018/handbook-european-law-relating-cybercrime-and-fundamental-rights), which is expected to be published in midst-2020, first in English and then in other European languages.

0
Read More

Organisation of the SecSoft workshop – Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft)

On 24th of June 2019 ourpartners from CSCAN, KEMEA and UOP will participate in the first International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft) is a joint initiative from EU Cyber-Security and 5G projects: ASTRID, SPEAR, CYBER-TRUST, REACT, SHIELD and 5GENESIS. The organisation of this workshop (https://www.astrid-project.eu/secsoft/) co-hosted at 5th IEEE International Conference on Network Softwarization (NetSoft 2019) that will be held in Paris, France on June 24-28, 2019, aims at bringing together…

0
Read More

BILETA Annual Conference 2019 “Back to the futures?”

On 16th of April 2019, our partners from VUB participated in the BILETA Annual Conference 2019 “Back to the futures?” that takes place at Queen’s University Belfast, UK is organised by the British and Irish Legal Education and Technology Association (BILETA) and attracts every year a significant number of academics and legal practitioners in the field of law and technology from all over the world. It also offers publication opportunities in high-ranking peer reviewed journals and various research funding schemes.…

0
Read More

Participation in experts´ forum/ Collaboration with other projects – LSTS Cyber and Data Security Team

On 1st of April 2019, our partners from VUB participated in this forum where LSTS Cyber and Data Security Team is a hub, consisting of academics and practitioners, that conducts research on topics of cybercrime, cybersecurity, data protection and privacy from an interdisciplinary perspective. In cooperation with them, Olga Gkotsopoulou, as participant of the Cyber-Trust project, will be engaged in various dissemination and communication activities, with direct relation to WP3, for instance, organisation of workshops, seminars and panel discussions as…

0
Read More

Keynote Presentation at the 13th Meeting of the Community of Users on Secure, Safe, Resilient Societies

Our Technical Coordinator Dr. Nicholas Kolokotronis from UOP, was the keynote speaker at the “13th Meeting of the Community of Users on Secure, Safe, Resilient Societies”, which is an annual event is co-organised by DG HOME and DG CONNECT of the European Commission. CYBER-TRUST project participated in the “13th Meeting of the Community of Users on Secure, Safe, Resilient Societies”, which is an annual event is co-organised by DG HOME and DG CONNECT of the European Commission (www.securityresearch-cou.eu/node/9200). A presentation…

0
Read More

H2020 Project-Clustering workshop

On 28th of March 2019, our partners from UOP participated in the H2020 Project-Clustering workshop” is organized by the GHOST project aiming at establishing tight connections with relative H2020 projects in the field of cybersecurity in IoT and relative domains and took place on 28th of March 2019, in Athens. The website of GHOST Project is https://www.ghost-iot.eu/ During this meeting Many interesting discussions with other projects’ representatives were made in areas of CYBER-TRUST’s interest.

0
Read More

The 13th Meeting of the Community of Users on Secure, Safe, Resilient Societies”

The 13th Meeting of the Community of Users on Secure, Safe, Resilient Societies”, which is an annual event is co-organised by DG HOME and DG CONNECT of the European Commission (www.securityresearch-cou.eu/node/9200). Our partners from UOP participated in the workshop, during the meeting, a presentation was given in the area of cybersecurity intelligence and the thematic group on cyber-crime and security. The talk was entitled “Mining for cyber-threat intelligence to improve cyber-security risk mitigation”. Many interesting discussions with other projects’ representatives…

0
Read More

Recurrent leadership event with Lead experts and decision makers of Industry and Government sector mainly within CGI leadership team

On 14th of March 2019, the recurrent leadership event with Lead experts and decision makers of Industry and Government sector mainly within CGI leadership team with regular invitees from customers. The meetings are by invitation only and gather government industry leaders. Dr Gohar Sargsyan presents and discusses Cyber-Trust project and high-level design architecture principles being applied on the project to shape the framework and solution. The focus of discussion is mainly WP4 – Cyber-Trust framework and reference architecture. As part…

0
Read More
Contact us

This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 786698. The content of this website does not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of such content. Therefore, any communication activity related to the action reflects only the author’s view and the European Commission is not responsible for any use that may be made of the information it contains.

Data Protection Policy

The information provided on this website has been prepared exclusively for the purpose of providing information about the Cyber-Trust project and related activities. The Cyber-Trust consortium has tried to ensure that all information provided in this website is correct at the time it was included. By accessing this website, you agree that the Cyber-Trust consortium will not be liable for any direct or indirect damage or any consequential loss arising from the use of the information contained in this website or from your access to any other information on the internet via hyperlinks. The copyright in the material contained in this website belongs to the Cyber-Trust consortium. The Cyber-Trust consortium disclaims any liability that may be claimed for infringement or alleged infringement of patents. 

Archives