Services

Statistical & Signature based detection

Real time DDOS and RoQ attack detection Deep packet inspection Protocol analysis Anomaly detection

IoT Device Tampering Detection & Remediation

Autonomous health monitoring of IoT devices Tampering attempts Abnormal payload and traffic

Cyber-threat Intelligence Gathering & Sharing System

Novel approach: Deep and machine learning techniques Game-theoretic framework to provide recommendations for IoT service providers based on the information regarding vulnerabilities Game-theory and machine learning to create patterns and predict the evolution of malwares and botnets Intelligence gathering from: Clearnet Deep and dark web Intelligence sharing to: Organisations SOC teams Security experts LEAs CERTs

Cyber-Trust Blockchain

Provide trusted transaction processing and coordination between IoT devices Ensure security: Identity Data Communication Safeguarding critical files and software binaries Minimize the damage caused by tampered devices and malware as well as single points of failure Collection and storing of forensic evidence

IoT device Profiling

Develop a privacy-preserving IoT device (vulnerability) profiling framework, so that any communications with high risk devices are subject to more thorough analysis.

Self-adaptive Virtual 3D environment

The flat representation (on the screen) may provide synthetic information about the status of the IoT network that can be used for the monitoring phase. It will use BODY OCULUS (or similar viewers) and body movement(e.g. hand gestures) to navigate and inspect the network. Through the VR mode it will be possible to cover more network area per analyst and see more in less time; it will also allow to see panels of related information surrounding the operator in a…

This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 786698. The content of this website does not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of such content. Therefore, any communication activity related to the action reflects only the author’s view and the European Commission is not responsible for any use that may be made of the information it contains.

Data Protection Policy

Legal Notice

Archives