IRIS

Artificial Intelligence threat Reporting and Incident response System

 

Objective

The IRIS project aims to:

  • deploy autonomous IoT and AI threat detection, enriched with privacy-based intelligence sharing and collaboration and advanced data protection and accountability.
  • present the first dedicated online training and cyber exercises to prepare CERTs / CSIRTs to collaboratively protect critical infrastructures and systems against international AI and IoT threats.
  • integration into the existing EU MeliCERTes platform, with support from INTRASOFT, while training will build on THALES’ existing cyber range, and the ECSO platform will ensure contribution to cybersecurity standards and policy formulation.

With the formal support of the four H2020 Cybersecurity Competence Network, the IRIS project will also be actively involved in the cybersecurity ecosystem in Europe.

Impact

Advances in Artificial Intelligence (AI) and Internet of Things (IoT) have increased exponentially in recent years, as have concerns about cybersecurity. The IRIS project will address the challenges of Information and Communications Technology (ICT) systems based on IoT and AI through a collaborative approach centered on security incident response teams (CERTs / CSIRTs). Specifically, the project equips CERTs / CSIRTs with a state-of-the-art incident response toolkit to assess, detect, respond and share information on threats and vulnerabilities of IoT and AI-based ICT systems.

The project will establish the first dedicated online training and cyber exercises to prepare CERTs / CSIRTs to collaboratively protect critical infrastructure and systems against international AI and IoT threats. Pilot demonstrators will be conducted in Helsinki, Tallinn and Barcelona.

INOV participation

In addition to coordinating the IRIS project, INOV contributes with expertise in access control cryptography in distributed and fully decentralized environments supported by blockchain. This knowledge, developed within the scope of an initiative to combat fake news, guarantees, through cryptography, that the rules for controlling access to distributed information defined by each entity are respected. This contribution is essential to ensure the protection of information exchanged, including personal data, between incident response teams.