Cyber-Trust is committed to the Open Source community

Visit our Open Source Repository

Visit our Repo

Read through Trends & Reports on Cyber-Security, our public project  deliverables and also the project publications…

Visit our reading corner

Read more

1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures. The main purpose of the SecSoft workshop is to integrate the “Security, Safety, Trust and Privacy support in virtualized environments” conference topic.

Coorganising SecSoft2019 as part of the IEEE NetSoft Paris France – CALL FOR PAPER SUBMISSIONS

Read more

Develop an innovative cyber-threat intelligence gathering, detection, and mitigation

innovative cyber-threat platform

Our Test Cases
CyberTrust will be carrying our two main pilots

Internet Service Providers (ISPs) offer advanced M2M solutions to commercial customers and plans on expanding to IoT services for smart metering, smart homes and smart buildings, as a great shift towards these IoT markets is expected in Cyprus in the near future. In the first validation period, running for four months, the platform will be validated by an ISP provider.

The ISP provider will test the platform on the use case categories: (a) zero-day vulnerability discovery, (b) monitoring and vulnerability assessment, (c) network-level attacks, and (d) device-level attacks.

Communications Provider

Primary Pilot

The Hellenic Cyber-Crime Division with its HQs established in Athens, since 2004, when the unit was upgraded to a full department of the Hellenic Police, it has resolved over 6,000 cases of fraud, extortion and child abuse, while several resolved cases were only partially committed in Greece.

KEMEA and the Hellenic Cyber-Crime Division, using the data produced by the first pilot, will test the platform regarding its capabilities w.r.t. (e) forensic evidence collection.

Hellenic Police

Secondary Pilot
What are the platform aspects...
Zero-day vulnerabilities, threat sharing, network monitoring, blockchain, forensic evidence, device tampering, DDoS attacks, detection and mitigation, reputation systems, data protection and privacy.

Statistical & Signature based detection

Real time DDOS and RoQ attack detection Deep packet inspection Protocol analysis Anomaly detection

IoT Device Tampering Detection & Remediation

Autonomous health monitoring of IoT devices Tampering attempts Abnormal payload and traffic

Cyber-threat Intelligence Gathering & Sharing System

Novel approach: Deep and machine learning techniques Game-theoretic framework to provide recommendations for IoT service providers based on the information regarding vulnerabilities Game-theory and machine learning to create patterns and predict the evolution of malwares and botnets Intelligence gathering from: Clearnet Deep and dark web Intelligence sharing to: Organisations SOC teams Security experts LEAs CERTs

Cyber-Trust Blockchain

Provide trusted transaction processing and coordination between IoT devices Ensure security: Identity Data Communication Safeguarding critical files and software binaries Minimize the damage caused by tampered devices and malware as well as single points of failure Collection and storing of forensic evidence

IoT device Profiling

Develop a privacy-preserving IoT device (vulnerability) profiling framework, so that any communications with high risk devices are subject to more thorough analysis.

Self-adaptive Virtual 3D environment

The flat representation (on the screen) may provide synthetic information about the status of the IoT network that can be used for the monitoring phase. It will use BODY OCULUS (or similar viewers) and body movement(e.g. hand gestures) to navigate and inspect the network. Through the VR mode it will be possible to cover more network area per analyst and see more in less time; it will also allow to see panels of related information surrounding the operator in a…

Presentation at the workshop From the Internet to Blockchain: Social Informatics, Digital Creative Economy

On the 12th of November 2018, our partners from UOP and more specifically Dr. Costas Vassilakis presented Cyber-Trust through his presentation entitled “Τεχνολογίες blockchain για ενίσχυση της ασφάλειας και της ιδιωτικότητας” The workshop entitled “From the Internet to Blockchain: Social Informatics, Digital Creative Economy” focused on the effect that emerging technologies have on aspects such as freedom, security, digital rights, privacy, intellectual property rights, and the economic, social, political and cultural evolution of citizens. The CyberTrust project was promoted by…

0
Read More

UPD: DECENTRALIZED 2018

After the huge success of Decentralized 2017, the University of Nicosia is proud to announce that Decentralized 2018 will take place on November 14-16, 2018 at the Divani Caravel, Athens, Greece. This world-class summit will feature 70+ speakers and 1,000+ attendees from over 50 countries, exchanging knowledge and ideas on the innovative business and political implications of blockchain technologies Our technical manager Dr. Nicholas Kolokotronis represented the CyberTrust consortium in the Decentralized 2018 conference with a speech on the use…

0
Read More

GIIS2018 paper presentation: Detection of LDDoS “Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis

Our partners from CSCAN on the 23rd of Oct participated with a paper presentation in the Global Information Infrastructure and Networking Symposium (GIIS2018) in Thessaloniki, Greece. Participation in Global Information Infrastructure and Networking Symposium (GIIS 2018) that was held in Thessaloniki, Greece, for presenting the paper entitled ” Detection of LDDoS “Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis,” The presentation intrigued the interest of attendees. The audience was very keen in making questions with regards to the agentless dynamic malware analysis…

0
Read More

GIIS2018 paper presentation: Detection of LDDoS Attacks Based on TCP Connection Parameters

Our partners from CSCAN on the 23rd of Oct participated with a paper presentation in the Global Information Infrastructure and Networking Symposium (GIIS2018) in Thessaloniki, Greece. Participation in Global Information Infrastructure and Networking Symposium (GIIS 2018) that was haled in Thessaloniki, Greece, for presenting the paper entitled ” Detection of LDDoS “Attacks Based on TCP Connection Parameters,” The presentation received many questions regarding the LDDOS detection features used as well as the testbed setup. Also, participants show great interest for the…

0
Read More

Technical presentation at University of Milan – SESAR Lab (Milan)

Technical presentation at University of Milan – SESAR Lab (Milan) Our partners from MATHEMA participated in the meeting was held at the University of Milan, SEcure Service-oriented Architectures Research Lab. The goal of the meeting was to present the project and to explore next opportunities of collaboration especially in the application of blockchain technology.

0
Read More

Initiation of Collaboration with ASTRID project on an organizing a join workshop in the 5th IEEE International Conference on Network Softwarization (NetSoft 2019)

Initiation of Collaboration with ASTRID project on an organizing a join workshop in the 5th IEEE International Conference on Network Softwarization (NetSoft 2019) will be held on June 24-28, 2019 in Paris, France where our partners from ADITESS, CSSCAN, KEMEA and UOP will participate. The purpose of the workshops is to complement the conference program with in-depth or integration forums that are dedicated to related and emerging topics of Cyber-Trust, ASTRID as well as other H2020 projects under the same…

0
Read More

Cyber security Week at The Hague, The Netherlands

On the first of October, our partners from CGI together HSD (The Hague Security Delta) participated in the event in the innovation room introducing Cyber-Trust among other CGI security and safety solutions and services in Netherlands. Also Highlights of the Cyber-Trust project were briefly presented.

0
Read More

MEDIA4SEC – Innovative Market Solutions Workshop was held in Brussels, Belgium

MEDIA4SEC – Innovative Market Solutions Workshop was held in Brussels, Belgium. Our partners from Aditess participated on 27th of September 2018, in the attended workshop focused on the impact of social media platforms and information revealed by such platforms. Within the workshop a number of innovative solutions related to the investigation of cybercrime and cybersecurity were presented. Cyber-Trust gained a lot of interest from LEAs participating to the event. The audience was very keen in making questions with regards to…

0
Read More

Meeting at University of Milan – SESAR Lab (Milan) 

Our partners from MATHEMA participated in the meeting at the eleventh of September in 2018 that took place in the technical presentation at University of Milan – SESAR Lab (Milan).The meeting was held at the University of Milan, SEcure Service-oriented Architectures Research Lab. The goal of the meeting was to present the project and to explore next opportunities of collaboration especially in the application of blockchain technology.  

0
Read More

Technical presentation at THALES, Sesto Fiorentino (FI) 

Technical presentation at THALES, Sesto Fiorentino (FI) Our partners from MATHEMA participated in the meeting that was held at the University of Florence with the international research group of the Center for Cyber Security. The goal of the meeting was to discuss the possible common research field for synergies in research and technology transfer.    

0
Read More
Contact us

This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 786698. The content of this website does not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of such content. Therefore, any communication activity related to the action reflects only the author’s view and the European Commission is not responsible for any use that may be made of the information it contains.

Data Protection Policy

The information provided on this website has been prepared exclusively for the purpose of providing information about the Cyber-Trust project and related activities. The Cyber-Trust consortium has tried to ensure that all information provided in this website is correct at the time it was included. By accessing this website, you agree that the Cyber-Trust consortium will not be liable for any direct or indirect damage or any consequential loss arising from the use of the information contained in this website or from your access to any other information on the internet via hyperlinks. The copyright in the material contained in this website belongs to the Cyber-Trust consortium. The Cyber-Trust consortium disclaims any liability that may be claimed for infringement or alleged infringement of patents. 

Archives