Project information
Sharing and Automation for Privacy Preserving Attack Neutralization
(SAPPAN)
- Project Identification
- 833418
- Project Period
- 5/2019 - 4/2022
- Investor / Pogramme / Project type
-
European Union
- Horizon 2020
- Secure societies - Protecting freedom and security of Europe and its citizens (Societal Challenges)
- MU Faculty or unit
-
Institute of Computer Science
- RNDr. Tomáš Jirsík, Ph.D.
- Mgr. Michal Čech
- RNDr. Milan Čermák, Ph.D.
- RNDr. Martin Laštovička, Ph.D.
- Bc. Tomáš Plesník
- Project Website
- https://sappan-project.eu
- Keywords
- sharing; privacy preserving; CSIRT; distributed; incident; response; recovery; cyber attack; detection
- Cooperating Organization
-
Fraunhofer Society for the Advancement of Applied Research e.V.
- Responsible person Benjamin Heitmann
The SAPPAN project aims to enable efficient prevention and protection of modern ICT infrastructures via advanced data acquisition, thread analysis, and privacy-aware sharing and distribution of threat intelligence aimed to dynamically support human operators in response and recovery actions.
We develop a collaborative and federated scalable attack detection to support response activities and in particular, allow for timely responses to newly emerging threats supporting different privacy-levels.
Further, we define a standard for the interoperable and machine-readable description of incident response reports and recovery solutions. The risk assessment, privacy, and security will be addressed in the standard design. We document the recovery procedures and provide processes and tools for knowledge management of incident handling within organizations, enabling the finding of similar incidents and suggesting response and recovery actions based on successful solutions in the past.
Results of both attack detection and recovery and response processes will be shared on a global level to achieve an advanced response and recovery via knowledge sharing and federated learning. We develop a mechanism for sharing information on threat intelligence which implements a combination of encryption and anonymization to achieve GDPR compliance.
Last, but not least, we will develop novel visualization techniques that assist security and IT personnel, and provide an enhanced content of context of the response and recovery, and improved visual presentation of the response and recovery process.
Publications
Total number of publications: 5
2022
-
Incident Investigation: From Packets to Graph-Based Analysis
Year: 2022, type:
-
Toward Graph-Based Network Traffic Analysis and Incident Investigation
Year: 2022, type:
2021
-
GRANEF: Utilization of a Graph Database for Network Forensics
Proceedings of the 18th International Conference on Security and Cryptography, year: 2021
-
Graph-based Network Traffic Analysis for Incident Investigation
Year: 2021, type:
-
Host Behavior in Computer Network: One-Year Study
IEEE Transactions on Network and Service Management, year: 2021, volume: 18, edition: 1, DOI