ICT for Societal Challenges - European Commission - Europa
ICT for Societal Challenges - European Commission - Europa
ICT for Societal Challenges - European Commission - Europa
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Threat monitoring and security in<strong>for</strong>mation sharing<br />
Combating cyber-crime becomes increasingly hard, <strong>for</strong> multiple reasons:<br />
• Malicious software is designed to defeat today’s best practices from<br />
technological and economic points of view.<br />
• Organizations are consolidating malicious activities into profitable professional<br />
endeavours.<br />
A lot can be gained by exchanging in<strong>for</strong>mation on vulnerabilities or attacks. However,<br />
private sector and national security authorities are reluctant to share in<strong>for</strong>mation<br />
unless they have a system they can fully trust. These limitations have prevented<br />
the emergence of an open standard investigation framework <strong>for</strong> consistent and<br />
systematic malware analysis.<br />
In this field, the WOMBAT project aimed at providing new means to understand the<br />
existing and emerging threats that are targeting the Internet economy and the net<br />
citizens. The acquired datasets and knowledge was shared with all interested security<br />
actors (ISPs, CERTs, security vendors, etc.),<br />
enabling them to make sound security investment<br />
decisions and to focus on the most dangerous<br />
activities first. Special care was devoted to impact<br />
the level of confidence of the <strong>European</strong> citizens in<br />
the net economy by leveraging computer security<br />
awareness in Europe. The Wombat results are<br />
now being successfully used in a number of<br />
applications and have given rise to additional<br />
international research and development activities.<br />
Wombat<br />
The project concentrated on:<br />
• real time gathering of a diverse set of security related raw data<br />
• enrichment of this input by means of various analysis techniques, and<br />
• root cause identification and understanding of the phenomena under scrutiny<br />
http://www.wombat-project.eu/<br />
Funded by the Seventh Framework Programme (FP7)<br />
Duration: 2008-2011<br />
58