Skip to main content

Cyber-Trust: Meeting the Needs of Information Sharing Between ISPs and LEAs

  • Chapter
  • First Online:
Technology Development for Security Practitioners

Abstract

This chapter presents the Cyber-Trust cyber-threat intelligence, detection, and mitigation platform, which delivers solutions for enhancing the security of the Internet of things, showcasing its value for law enforcement agencies (LEAs) and how they will be assisted in accessing, viewing, and receiving information that potentially holds digital evidence of specific cyber-crimes against Internet service providers and smart homes, in a timely manner. We present how information from different software components (e.g. Blockchain), when integrated based on the needs of the end-users, can greatly assist in the detection and correlation of digital evidence and the collaboration between the LEAs and providers. The challenges imposed by the national and European legislation are further discussed along with possible ways to address these shortcomings via the Cyber-Trust platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In this chapter, by referring to Internet service providers, the authors refer to Internet access providers and telecommunications providers.

References

  1. Cyber-Trust: D2.3 Cyber-Trust Use Case Scenarios, [Online] available: https://cyber-trust.eu/wp-content/uploads/2020/02/D2.3.pdf. Accessed 18 Feb 2020, [p. 02].

  2. IBM: Define and implement an IoT Security Strategy, IBM, [Online] available: https://www.ibm.com/internet-of-things/trending/iot-security. Accessed 01 Jul 2019, [p. 02].

  3. IBM Security connect, manage and analyze IoT data with Watson IoT Platform, Watson Internet of Things, IBM, [Online] available: https://www.ibm.com/internet-of-things/solutions/iot-platform, 2019. Accessed 01 Jul 2019, [p. 02].

  4. Murphy J. (2016). Enhanced Security Controls for IBM Watson IoT Platform, IBM Watson IoT Platform IBM [Online] available: https://developer.ibm.com/iotplatform/. Accessed 01 Jul 2019, [p. 02].

  5. J. Clark, IBM and Whirpool: an innovative partnership, Internet of Things blog, IBM, [Online] available: https://www.ibm.com/blogs/internet-of-things/whirlpool/, 2016. Accessed 01 Jul 2019, [p. 02].

  6. IBM X-Force Red Vulnerability Management Services, IBM Security, IBM, [Online] available: https://www.ibm.com/security/services/vulnerability-scanning, 2019. Accessed 01 Jul 2019, [p. 03].

  7. Motorola solutions, CYBERSECURITY: Protect critical network infrastructure from cyber threats, Motorola, [Online] available: https://www.motorolasolutions.com/en_xp/managed-support-services/cybersecurity.html. Accessed 01 Jul 2019, [p. 03].

  8. Prasad R. IoT Infrastructre, Empowered by F5’s IoT solution”, F5, [Online] available: https://www.f5.com/company/blog/iot-infrastructure-empowered-by-f5s-iot-solution. Accessed 01 Jul 2019, [p. 03].

  9. Intel IoT Security and Scalability on Intel IoT Platform, [Online] available: https://www.intel.com/content/www/us/en/internet-of-things/iot-platform.html. Accessed 01 Jul 2019, [p. 03].

  10. AWS Cloud Services, [Online] available: https://aws.amazon.com/iot/. Accessed 01 Jul 2019, [p. 03].

  11. Ericsson IoT platform, [Online] available: https://www.ericsson.com/en/internet-of-things/iot-platform, Accessed 30 Jul 2019, [p. 03].

  12. Seriot, Secure and Safe Internet of Things [Online] available: https://seriot-project.eu/, 2018, Accessed 01 Jul 2019, [p. 03].

  13. SOFIE, Secure Open Federation for Internet Everywhere, [Online] available: https://www.sofie-iot.eu/, 2018. Accessed 01 Jul 2019, [p. 03].

  14. SOFIE, State of the Art in Blockchain Technology and IoTSystems, [Online] available: https://www.sofie-iot.eu/news/state-of-the-art-in-blockchain-technology-and-iot-systems, 2018. Accessed 01 Jul 2019, [p. 03].

  15. REACT, REactively Defending against Advanced Cybersecurity Threats, [Online] available: http://react-h2020.eu/, 2019. Accessed 04 07 2019, [p. 04].

  16. Astrid, AddreSsing ThReats for virtuallseD services, [Online] available: https://www.astrid-project.eu/, 2019. Accessed 04 Jul 2019, [p. 04].

  17. SPEAR, Secure and PrivatE smArt gRid, [Online] available: https://www.spear2020.eu/, 2017. Accessed 04 Jul 2019, [p. 04].

  18. SecureIoT, [Online] available: https://secureiot.eu/, 2019. Accessed 04 Jul 2019, [p. 04].

  19. CHARIOT, [Online] available: https://www.chariotproject.eu/About#LivingLabs, 2017. Accessed 04 Jul 2019, [p. 04].

  20. SEMIoTICS framework, [Online] available: https://www.semiotics-project.eu. Accessed 04 Jul 2019, [p. 04].

  21. GHOST project, [Online] available: https://www.ghost-iot.eu/ghost-project. Accessed 04 Jul 2019, [p. 04].

  22. Cyber-Trust, D2.4 Cyber-Trust end-user requirements, [Online] available: https://cyber-trust.eu/wp-content/uploads/2020/02/D2.4.pdf. Accessed 18 Feb 2020, [p. 05].

  23. Hyperledger Fabric, [Online] available: https://www.hyperledger.org/projects/fabric. Accessed 04 Jul 2019, [p. 09], [p. 11].

  24. Cyber-Trust, D7.2 CYBER-TRUST distributed ledger architecture, [Online] available: https://cyber-trust.eu/wp-content/uploads/2020/02/D7.2.pdf. Accessed 18 Feb 2020, [p. 09].

  25. Cyber-Trust, D7.3 CYBER-TRUST authority and publishing management, [Online] available: https://cyber-trust.eu/wp-content/uploads/2020/02/D7.3.pdf. Accessed 18 Feb 2020, [p. 10].

  26. Brotsis S. (2019). Blockchain solutions for forensic evidence preservation in IoT environments. In: 2019 IEEE Conference on Network Softwarization (NetSoft), Paris, France, 2019, pp. 110–114, [p. 11].

    Google Scholar 

  27. Cyber-Trust, D7.5 CYBER-TRUST information and evidence storage, [p. 11]

    Google Scholar 

Download references

Acknowledgements

Cyber-Trust project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 786698. The content of this chapter reflects only the author’s view, and the European Union is not responsible for any use that might be made of such content.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vasiliki Georgia Bilali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bilali, V.G. et al. (2021). Cyber-Trust: Meeting the Needs of Information Sharing Between ISPs and LEAs. In: Akhgar, B., Kavallieros, D., Sdongos, E. (eds) Technology Development for Security Practitioners. Security Informatics and Law Enforcement. Springer, Cham. https://doi.org/10.1007/978-3-030-69460-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-69460-9_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-69459-3

  • Online ISBN: 978-3-030-69460-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics