How to efficiently detect suspicious cyber activities? Encrypted Network Traffic Analysis and Transformation and Normalization techniques

The adoption of network encryption is rapidly growing. Global HTTPS page loads have increased to more than 80%. Even though network encryption is crucial for the protection of users and their privacy, network encryption introduces challenges for systems that perform deep packet inspection and rely heavily on the processing of…

Continue reading

How does CyberSANE comply with the legal and ethical aspects for the protection of Critical Information Infrastructures (CIIs)?

CyberSANE is a peer-to-peer solution which aims to enhance the cybersecurity of Critical Infrastructures’ information systems through the collection, correlation and sharing of information coming from multiple sources. The end-users who will implement the CyberSANE system must comply with several legal obligations which are relevant to this type of systems,…

Continue reading

Taxonomy of Threat Landscape

Classifying the objects of study by their similarities is a fundamental step when doing research. Passion for classification became one of the signatures of the Enlightenment. During this period, many researchers, following the modern scientific method, tried to unravel the mysteries of an apparently ordered cosmos. One of them was…

Continue reading

Architecture for an innovative, knowledge-based, and collaborative, security and dynamic response system

The CyberSANE System intends to be an innovative, knowledge-based, collaborative security and response dynamic system. Its main goal is to implement all phases of the Cyber incident handling lifecycle, increasing the agility of the security professionals and encourage continuous learning. Based on the Microservices Architecture pattern, CyberSANE architecture is similar…

Continue reading