SU-ICT-01-2018

Dynamic countering of cyber-attacks -

⚫ indicates current topic
Node background color indicates the call topic status
Double click on a topic to center information around it.
Node size is proportional to distance from the current topic

About the connections

The graph above was generated based on the following links

  • SU-ICT-02-2020
    Building blocks for resilience in evolving ICT systems

    MOTIVATION There are many common issues in these topics, such as assurance, validation, vulnerabilities, threat models.

  • Update link information
    Be aware that editing a link text will make it have to pass to quality control again before it will be publicly visible (unless you are an admin)
    Type
    Motivation NCP (only) comment

Call text (as on F&T portal)

View on F&T portal
Specific Challenge:

The prevention of and the protection against attacks that target modern ICT components, complex ICT infrastructures and emerging technologies (e.g. IoT) remains a difficult task. The complexity of heterogeneous collections of hardware and software components finds its roots in the diversity of development contexts and of levels of maturity, in the growing means of networked interactions, in the massive exchange of information and data, and in the varied schedules of systems lifecycles that generate highly dynamic behaviours. The increase of encrypted flows over the Internet should lead to adopt new techniques for detection of suspicious cyber activities and traffic patterns, and for classification of flows, while keeping privacy and confidentiality. Another relevant challenge is to use machine learning and analytics for cybersecurity.

Scope

Proposals are invited against at least one of the following two subtopics:

a) Cyber-attacks management - advanced assurance and protection

Innovative, integrated and holistic approaches in order to minimize attack surfaces through appropriate configuration of system elements, trusted and verifiable computation systems and environments, secure runtime environments, as well as assurance, advanced verification tools and secure-by-design methods. This may entail a whole series of activities, including behavioural, social and human aspects in the engineering process until developed systems and processes address the planned security/privacy/accountability properties.

Proposals should explore how recent progress in artificial intelligence, in deep learning and in other related technologies can be used to provide breakthroughs in the fight against cyber-attacks (e.g. recognition of malicious activities on the network). Deep learning applications may also be used for cyber threat intelligence in anticipation of cyberattacks to identify malicious activity trends in the cyber space and correlate with attackers’ information, tools and techniques.

Proposals may also cover secure execution environments not only including the execution platforms themselves plus the operating systems, but also the mechanisms (e.g. security supporting services, authentication/access control mechanisms) that ensure an adequate level of security, privacy and accountability in the execution of all processes.

Proposals are encouraged to provide mechanisms for informing the users on their security/privacy levels, for providing warnings and assisting them in handling security and privacy related incidents.

b) Cyber-attacks management – advanced response and recovery

Innovative capabilities to dynamically support human operators (e.g. Incident Response professionals), in controlling response and recovery actions, including information visualization. The capabilities should include the assessment how attacks propagate in a particular infrastructure and/or across interconnected infrastructures (e.g. attack-defence graphs) and what the best measures are to withstand and recover from a threat/attack, including the convergence with measures beyond cyber that can be needed (e.g. security policies).

Proposals should address the use of -and the contribution to- appropriate threat intelligence sources as well as the share of information with relevant parties (e.g. industry cooperation groups, Computer Security Incident Response Teams - CSIRTs).

Proposals should explore forensics, penetration testing, investigation and attack attribution services -local or remote- to achieve proper identification and better protection against future attacks and zero-day vulnerabilities. Approaches can include the combination of massive data and logs collection from various sources (e.g. network traffic, dark web) to facilitate investigation on security alerts and to find suspicious files trajectories in order to have the most appropriate response. Efficient utilization of both structured data (e.g. logs) and unstructured data (e.g. data coming from social networks such as pictures, tweets, discussions on forums) should be addressed.

Applicants should also consider the efficient handling (e.g. classification, anomaly detection) of encrypted network traffic and in particular where data stays encrypted, while keeping compliance with end user’s privacy requirements.

Proposals need to consider dynamic, evidence based security and privacy risk assessment methodologies and management tools targeting emerging/advanced technologies (e.g. IoT, virtualised and service-oriented systems/networks).

Proposals are encouraged to provide mechanisms for informing the users on their security/privacy levels, for providing warnings and assisting them in handling security and privacy related incidents.

The outcome of the proposal is expected to lead to development up to Technology Readiness level (TRL) 6; please see Annex G of the General Annexes.

The Commission considers that proposals requesting a contribution from the EU of between EUR 4 and 5 million would allow this area to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.

For grants awarded under this topic for Innovation Action the Commission or Agency may object to a transfer of ownership or the exclusive licensing of results to a third party established in a third country not associated to Horizon 2020. The respective option of Article 30.3 of the Model Grant Agreement will be applied.

Expected Impact:

Short/medium term

  • Enhanced protection against novel advanced threats.
  • Advanced technologies and services to manage complex cyber-attacks and to reduce the impact of breaches.
  • The technological and operational enablers of co-operation in response and recovery will contribute to the development of the CSIRT Network across the EU, which is one of the key targets of the NIS Directive.

Long term

  • Robust, transversal and scalable ICT infrastructures resilient to cyber-attacks that can underpin relevant domain specific ICT systems (e.g. for energy) providing them with sustainable cybersecurity, digital privacy and accountability.
Cross-cutting Priorities:

Socio-economic science and humanitiesContractual Public-Private Partnerships (cPPPs)Cybersec

News flashes

2020-03-27

An overview of the evaluation results of topic SU-ICT-02-2020 is now available under section Topic conditions and documents - Additional documents.

2019-10-08

Please note that a Guide to ICT-related activities in H2020 work programme 2018-20 has been published in the Additional documents section in Topic conditions and documents oftopic page SU-ICT-02-2020.

2019-07-25
The submission session is now available for: SU-ICT-02-2020(RIA)
2019-03-06

An overview of the evaluation results (called 'Call results') of topic SU-ICT-04-2018 is now available under section Topic conditions and documents - Additional documents.

2018-12-06

An overview of the evaluation results (called 'Call results') of topic SU-ICT-01-2018 is now available under section Topic conditions and documents - Additional documents.

2018-11-16

CallH2020-SU-ICT-2018-3 has closed on14November 2018.

3proposals have been submitted to topic SU-ICT-04-2018 (IA).
2018-08-28

CallH2020-SU-ICT-2018 has closed on 28 August 2018.

51proposals have been submitted to topic SU-ICT-01-2018 (IA).
2018-08-21

An overview of the evaluation results (called 'Call results') of the topic SU-ICT-03-2018 is now available under section Topic conditions and documents - Additional documents.

2018-07-26
The submission session is now available for: SU-ICT-04-2019(IA)
2018-05-30

On 29 May 2018, call H2020-SU-ICT-2018-2 closed at 17:00.

13 proposals were submitted in totalto thetopic SU-ICT-03-2018 (RIA).

2018-03-15
The submission session is now available for: SU-ICT-01-2018(IA)
2018-03-01

We herewith bring to the attention of applicants that they are permitted to remove the page break on the cover page of the technical annex's template. This means that the text of the proposal can start on the cover page.

2018-02-01
The submission session is now available for: SU-ICT-03-2018(RIA)
call topic details
Call status: Closed
Publication date: 2017-10-27 (7 years ago)
Opening date: 2018-03-15 (7 years ago)
Closing date: 2018-08-28 (6 years ago)
Procedure: single-stage

Budget: 40000000
Expected grants: not specified
News flashes

This call topic has been appended 13 times by the EC with news.

  • 2020-03-27
    an overview of the evaluation results...
  • 2019-10-08
    please note that a guide to ict-related...
  • 2019-07-25
    the submission session is now available...
  • 2019-03-06
    an overview of the evaluation results (c...
  • 2018-12-06
    an overview of the evaluation results (c...
  • 2018-11-16
    callh2020-su-ict-2018-3 has closed on14n...
  • 2018-08-28
    callh2020-su-ict-2018 has closed on 28 a...
  • 2018-08-21
    an overview of the evaluation results (c...
  • 2018-07-26
    the submission session is now available...
  • 2018-05-30
    on 29 may 2018, call h2020-su-ict-2018-2...
  • 2018-03-15
    the submission session is now available...
  • 2018-03-01
    we herewith bring to the attention of ap...
  • 2018-02-01
    the submission session is now available...
Call

H2020-SU-ICT-2018-2020

Call topics are often grouped together in a call. Sometimes this is for a thematic reason, but often it is also for practical reasons.

There are 3 other topics in this call:

Source information

Showing the latest information. Found 1 version of this call topic in the F&T portal.

Information from

  • 2024-03-30_14-22-54

Annotations (will be publicly visible when approved)

You must be logged in to add annotations
No annotations yet

Events

This is just a very first implementation, better visualisation coming

Events are added by the ideal-ist NCP community and are hand-picked. If you would like to suggest an event, please contact idealist@ffg.at.

Call topic timeline

What phase of the topic timeline are we in? This timeline contains some suggestions on what are realistic actions you should or could take at this moment. The timeline is based on the information provided by the call topic.
  1. Work programme available

    - 7 years ago

    The call topics are published first in the Work Programme, which is available a while before the call opens. By following up the Work Programme publications, you can get a headstart.

  2. Publication date

    - 7 years ago

    The call was published on the Funding & Tenders Portal.

  3. Opening date

    - 7 years ago

    The call opened for submissions.

  4. Closing date

    - 6 years ago

    Deadline for submitting a project.

  5. Time to inform applicants Estimate

    - 6 years ago

    The maximum time to inform applicants (TTI) of the outcome of the evaluation is five months from the call closure date.

  6. Sign grant agreement Estimate

    - 6 years ago

    The maximum time to sign grant agreements (TTG) is three months from the date of informing applicants.

  7. Today

Funded Projects

Loading...

Project information comes from CORDIS (for Horizon 2020 and Horizon Europe) and will be sourced from F&T Portal (for Digital Europe projects)