Cyber-Trust is committed to the Open Source community

Visit our Open Source Repository

Visit our Repo

Read through Trends & Reports on Cyber-Security, our public project  deliverables and also the project publications…

Visit our reading corner

Read more

Cyber-Trust co-organizes EPESec 2020 in conjunction with ARES workshops EU Projects Symposium 2020 at 15th International Conference on Availability, Reliability and Security (ARES 2020 – https://www.ares-conference.eu).

Cyber-Trust in ARES Conference 2020

Read more

Develop an innovative cyber-threat intelligence gathering, detection, and mitigation

innovative cyber-threat platform

Our Test Cases
CyberTrust will be carrying our two main pilots

OTE is the largest telecommunications company in the Greek market, providing broadband and fixed line telephony services to Greek and international companies, consumers and public sector bodies. The OTE Group – comprising OTE S.A. and its subsidiaries – also offers mobile telephony services, Internet access, digital communications, leased line services and high-speed data communication.

OTE has the role of the end-user, who will integrate the resulting security platform on premise.

Communications Provider

Primary Pilot

The Hellenic Cyber-Crime Division with its HQs established in Athens, since 2004, when the unit was upgraded to a full department of the Hellenic Police, it has resolved over 6,000 cases of fraud, extortion and child abuse, while several resolved cases were only partially committed in Greece.

KEMEA and the Hellenic Cyber-Crime Division, using the data produced by the first pilot, will test the platform regarding its capabilities w.r.t. (e) forensic evidence collection.

Hellenic Police

Secondary Pilot
What are the platform aspects...
Zero-day vulnerabilities, threat sharing, network monitoring, blockchain, forensic evidence, device tampering, DDoS attacks, detection and mitigation, reputation systems, data protection and privacy.

Statistical & Signature based detection

Real time DDOS and RoQ attack detection Deep packet inspection Protocol analysis Anomaly detection

IoT Device Tampering Detection & Remediation

Autonomous health monitoring of IoT devices Tampering attempts Abnormal payload and traffic

Cyber-threat Intelligence Gathering & Sharing System

Novel approach: Deep and machine learning techniques Game-theoretic framework to provide recommendations for IoT service providers based on the information regarding vulnerabilities Game-theory and machine learning to create patterns and predict the evolution of malwares and botnets Intelligence gathering from: Clearnet Deep and dark web Intelligence sharing to: Organisations SOC teams Security experts LEAs CERTs

Cyber-Trust Blockchain

Provide trusted transaction processing and coordination between IoT devices Ensure security: Identity Data Communication Safeguarding critical files and software binaries Minimize the damage caused by tampered devices and malware as well as single points of failure Collection and storing of forensic evidence

IoT device Profiling

Develop a privacy-preserving IoT device (vulnerability) profiling framework, so that any communications with high risk devices are subject to more thorough analysis.

Self-adaptive Virtual 3D environment

The flat representation (on the screen) may provide synthetic information about the status of the IoT network that can be used for the monitoring phase. It will use BODY OCULUS (or similar viewers) and body movement(e.g. hand gestures) to navigate and inspect the network. Through the VR mode it will be possible to cover more network area per analyst and see more in less time; it will also allow to see panels of related information surrounding the operator in a…

COVID-19: Amid a “pandemic” of cyber-attacks

A Cyber-Trust Brief Even though companies have become more resilient over time, studies show that cyber-attacks have evolved and have become even more frequent [i]. This is more so true, especially in times of emergency and disaster at a national or global level. Since the beginning of the COVID-19 outbreak which led in an increase in the number of people staying at home and the turn into digital services, a significant upsurge has been noted in the total of cyber-attacks…

0
Read More

AI for the future of prevention, detection and mitigation of cyberattacks: what is at stake for privacy and data protection?

On 23th January 2020, Cyber-Trust organised the panel “AI for the future of prevention, detection and mitigation of cyberattacks: what is at stake for privacy and data protection?” in the annual Computers, Privacy and Data Protection (CPDP) conference, in Brussels. The conference is one of the major data protection and privacy conferences in the world, gathering more than 1000 experts from Europe and overseas. The Cyber-Trust panel, chaired by the Vrije Universiteit Brussel (VUB) and with the participation of the…

0
Read More

Co-organising Mediterranean Security Event 2019 Crete, Greece

Cyber-Trust is co-organiser of the Mediterranean Security Event 2019. MSE2019, chaired by the Center for Security Studies (KEMEA) of the Greek Ministry of Citizen Protection, is the largest event of the year, which is collaboratively organized by the community of Security R&D stakeholders in the European Union. The event takes place in Crete at the Fodele Beach Hotel between the 29th to the 31st of October 2019. The MSE2019 is a joint initiative of thirty-six EU funded R&D projects supported…

0
Read More

I CYBER-TRUST YOU at the Mediterranean Security Event

CYBER-TRUST is more than happy to participate in the largest event of the year as a co-organiser. Mediterranean Security Event (MSE 2019) is organised by the CYBER-TRUST’s Project Coordinator, Centre of Security Studies (KE.ME.A.) and will take place in Fodele (Heraclion), Crete (Greece) on 29-31 October 2019. #MSE2019 will host a variety of cutting-edge EU funded #R&D projects, focused on the synergy and cooperation among #stakeholders, promotion and development of solutions. A variety of appealing cyber-oriented sessions, panels and forums will attract people…

0
Read More

Contribute to the development of CYBER-TRUST Platform

We would like to welcome you to the world of CYBER-TRUST «Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for Trusted Internet of Things» and ask your precious help and attention for the second (2nd ) round of CYBER-TRUST QUESTIONNAIRES.   CYBER-TRUST is a H2020 European project which goal is to develop an innovative platform cyber-threat intelligence gathering, detection, and mitigation platform to tackle the grand challenges towards securing the ecosystem of IoT devices. The security problems arising from the flawed design of legacy hardware and embedded devices allows cyber-criminals to easily compromise them and launch large-scale…

0
Read More

Organisation of the IEEE Services Workshop ( Cyber Security and Resilience in the Internet of Things )

Our partners from CSCAN and UOP will participate on the 1st IEEE Services Workshop on Cyber Security and Resilience in the Internet of Things is a joint event to the IEE World Congress (IEEE Services 2019) that will be held in Milan, Italy on July 8-13, 2019. The purpose of this Workshop is to bring together students, researchers, security experts and IT experts from Industry on areas under consideration by Cyber-Trust. It mainly focuses on both the theoretical & practical…

0
Read More

Planned study visit at the EU Agency for Fundamental Rights (FRA)

The European Union Agency for Fundamental Rights (FRA) is the EU’s centre of fundamental rights expertise where our partners from VUB will participate. Olga Gkotsopoulou during her study visit will contribute with her research in privacy and data protection, in particular with relation to WP3, to the drafting of the first “Handbook on European law relating to cybercrime and fundamental rights” (https://fra.europa.eu/en/project/2018/handbook-european-law-relating-cybercrime-and-fundamental-rights), which is expected to be published in midst-2020, first in English and then in other European languages.

0
Read More

Organisation of the SecSoft workshop – Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft)

On 24th of June 2019 ourpartners from CSCAN, KEMEA and UOP will participate in the first International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft) is a joint initiative from EU Cyber-Security and 5G projects: ASTRID, SPEAR, CYBER-TRUST, REACT, SHIELD and 5GENESIS. The organisation of this workshop (https://www.astrid-project.eu/secsoft/) co-hosted at 5th IEEE International Conference on Network Softwarization (NetSoft 2019) that will be held in Paris, France on June 24-28, 2019, aims at bringing together…

0
Read More
Contact us

This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 786698. The content of this website does not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of such content. Therefore, any communication activity related to the action reflects only the author’s view and the European Commission is not responsible for any use that may be made of the information it contains.

Data Protection Policy

The information provided on this website has been prepared exclusively for the purpose of providing information about the Cyber-Trust project and related activities. The Cyber-Trust consortium has tried to ensure that all information provided in this website is correct at the time it was included. By accessing this website, you agree that the Cyber-Trust consortium will not be liable for any direct or indirect damage or any consequential loss arising from the use of the information contained in this website or from your access to any other information on the internet via hyperlinks. The copyright in the material contained in this website belongs to the Cyber-Trust consortium. The Cyber-Trust consortium disclaims any liability that may be claimed for infringement or alleged infringement of patents. 

Archives