2021 IEEE International Conference on Cyber Security and Resilience

Full Program

Summary:

Information and Communication Technology (ICT) plays a crucial role in the era of hyper-connected digital economies in each aspect of the Critical Infrastructures (CIs). Although the advent of the Internet of Things (IoT) upgrades the automation processes of CIs providing multiple benefits it introduces in parallel severe security gaps allowing cybercriminals to perform more sophisticated cyber-attacks. Therefore a necessary and efficient countermeasure is the continuous update of the existing solutions based on the profiles and behaviours of the cyber-attackers. This paper proposes a web-based userfriendly platform called TRUSTY (Threat hunting using Data Analysis) to support cyber-security professionals and researchers in identifying cyber threats. Research honeypots are leveraged that can attract potential cyber-attackers and collect useful information about them. In particular a system architecture is presented capable of automatically collecting analysing and visualising the information coming from research honeypots depending on the user’s needs.

Author(s):

Panagiotis Radoglou-Grammatikis    
University of Western Macedonia
Greece

Athanasios Liatifis    
University of Western Macedonia
Greece

Elisavet Grigoriou    
Sidroco Holdings Ltd
Cyprus

Theocharis Saoulidis    
Sidroco Holdings Ltd
Cyprus

Antonios Sarigiannidis    
Sidroco Holdings Ltd
Cyprus

Thomas Lagkas    
International Hellenic University
Greece

Panagiotis Sarigiannidis    
University of Western Macedonia
Greece

 


Copyright © 2021 SUMMIT-TEC GROUP LTD