Cyber Trapper, Automation and control system

Domain #1

Sensitive infrastructure protection

Prototype

Open Call #1 laureate

Description of the project

Through Cyber Trapper platform, we will collect information on ongoing live IIoT attacks at hundreds of locations worldwide. We will collect data from our IIoT clones โ€“ traps as well as productions systems, analyse them in real time (in less than 10 milliseconds) and create dynamic threat feed lists with malicious compromise indicators used to prevent attacks at customer premises. This approach achieves the effect of “Crowd Immunity” – after the first attempt of an attacker to interact with the CyberTrapper at one of the group members, the entire group acquires immunity to that attacker and its attack vector.

Mid-term project update

A hardware platform was chosen for execution based on defined technical requirements. After that system development started, first with architecture design and UI drafts. Then the device arrived and integration could begin, which was the most interesting part for technical team. Successful integration of edge device and traps led the project team to testing part that showed really good results. The team is looking forward to working on optimizing the execution as well as integrating the system with central server.

Final project update

The goal of our CyberTrapper initiative was to make the internet a safer place for our users, by developing a smart solution that protects everyone. This works like a communal shield, gathering information from our virtual ‘traps’ worldwide to create a shared protective layer.

These traps, which are actually replicas of web services, are stationed on what we call edge devices. They work in tandem with a central server that processes all the collected data to identify and ward off threats.

At the start of this project, we selected a type of hardware that would best meet our technical needs. Once we had that sorted, we began creating the system, starting with designing the structure and creating some initial user interface ideas.

Once the necessary devices were ready, we began combining everything together a phase that our technical team found particularly exciting. Once we successfully connected the edge device with our traps, we began testing everything, and we’re happy to say that the results have been very promising.


We then moved on to developing the central server and integrating all parts of the system. Now, we’re eager to build a kind of communal protection for our wide network of users. This is all about everyone pitching in and making the internet a safer place together.

Project consortium

Datatek doo Beograd
Datatek doo Beograd
๐Ÿ‡ท๐Ÿ‡ธ
Serbia
ADVANCED SECURITY TECHNOLOGIES
ADVANCED SECURITY TECHNOLOGIES
๐Ÿ‡ท๐Ÿ‡ธ
Serbia
Avantools
Avantools
๐Ÿ‡ฌ๐Ÿ‡ท
Greece