{"id":1373,"date":"2024-02-23T12:44:53","date_gmt":"2024-02-23T12:44:53","guid":{"rendered":"https:\/\/abstractionslab.com\/?page_id=1373"},"modified":"2026-03-17T16:08:06","modified_gmt":"2026-03-17T16:08:06","slug":"cyfort","status":"publish","type":"page","link":"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/","title":{"rendered":"CyFORT"},"content":{"rendered":"\n<div class=\"wp-block-uagb-container uagb-block-61b7f5e0 alignfull uagb-is-root-container\">\n<div class=\"wp-block-uagb-image aligncenter uagb-block-51d20e29 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-zoomin wp-block-uagb-image--align-center\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2023\/11\/ITR-ALab-CyFORT-Logo_v1.0-1024x512.png ,https:\/\/abstractionslab.com\/wp-content\/uploads\/2023\/11\/ITR-ALab-CyFORT-Logo_v1.0.png 780w, https:\/\/abstractionslab.com\/wp-content\/uploads\/2023\/11\/ITR-ALab-CyFORT-Logo_v1.0.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2023\/11\/ITR-ALab-CyFORT-Logo_v1.0-1024x512.png\" alt=\"CyFORT logo\" class=\"uag-image-1232\" width=\"604\" height=\"302\" title=\"ITR-ALab-CyFORT-Logo_v1.0\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b2fad542 alignfull uagb-is-root-container\">\n<div class=\"wp-block-uagb-info-box uagb-block-bf5a74b7 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">CyFORT: Cloud Cybersecurity Fortress of Open Resources and Tools for Resilience<\/h3><\/div><p class=\"uagb-ifb-desc\">Abstractions Lab, in collaboration with itrust consulting, develop the CyFORT project in the context of the <a href=\"https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/ip_23_6246\" target=\"_blank\" rel=\"noreferrer noopener\">EC<\/a>-approved <a href=\"https:\/\/www.bmwk.de\/Redaktion\/EN\/Artikel\/Industry\/ipcei-cis.html\" target=\"_blank\" rel=\"noreferrer noopener\">IPCEI-CIS<\/a> under the <a href=\"https:\/\/www.8ra.com\" target=\"_blank\" rel=\"noreferrer noopener\">8ra umbrella initiative<\/a>.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-c042c293 alignfull uagb-is-root-container\">\n<div class=\"wp-block-uagb-container uagb-block-3720e28a\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-49b662bb\"><h2 class=\"uagb-heading-text\">IDPS-ESCAPE (\ud835\udfab release)<\/h2><p class=\"uagb-desc-text\"><strong><span style=\"text-decoration: underline;\">I<\/span><\/strong>ntrusion <strong><span style=\"text-decoration: underline;\">D<\/span><\/strong>etection and <strong><span style=\"text-decoration: underline;\">P<\/span><\/strong>revention <strong><span style=\"text-decoration: underline;\">S<\/span><\/strong>ystems &#8211; <strong><span style=\"text-decoration: underline;\">E<\/span><\/strong>nhanced <strong><span style=\"text-decoration: underline;\">S<\/span><\/strong>ecurity through a <strong><span style=\"text-decoration: underline;\">C<\/span><\/strong>ooperative <strong><span style=\"text-decoration: underline;\">A<\/span><\/strong>nomaly <strong><span style=\"text-decoration: underline;\">P<\/span><\/strong>rediction <strong><span style=\"text-decoration: underline;\">E<\/span><\/strong>ngine<br><br>An open-source SOAR system powered by a Risk-aware Anomaly Detection-based Automated Response (RADAR) subsystem and a deep learning-based AD subsystem (SONAR), integrated with Wazuh, Flowintel, Suricata.<\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-73f258c0\"><h5 class=\"uagb-heading-text\"><a href=\"https:\/\/abstractionslab.github.io\/idps-escape\/website\/product-presentation.html\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">IDPS-ESCAPE Product Presentation Website<\/mark><\/a><\/h5><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-cda74fd3\"><h5 class=\"uagb-heading-text\"><a data-type=\"link\" data-id=\"https:\/\/github.com\/AbstractionsLab\/c5dec\" href=\"https:\/\/github.com\/AbstractionsLab\/idps-escape\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">IDPS-ESCAPE repository on GitHub<\/mark><\/a><\/h5><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-ac5b6527\">\n<div class=\"wp-block-uagb-image alignright uagb-block-73fe68c1 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-grayscale wp-block-uagb-image--align-right alignwide\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2024\/09\/1D1B2_LOG_IDPS-ESCAPE_v1.0-1-300x300.png ,https:\/\/abstractionslab.com\/wp-content\/uploads\/2024\/09\/1D1B2_LOG_IDPS-ESCAPE_v1.0-1.png 780w, https:\/\/abstractionslab.com\/wp-content\/uploads\/2024\/09\/1D1B2_LOG_IDPS-ESCAPE_v1.0-1.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2024\/09\/1D1B2_LOG_IDPS-ESCAPE_v1.0-1-300x300.png\" alt=\"IDPS-ESCAPE logo\" class=\"uag-image-1615\" width=\"300\" height=\"300\" title=\"1D1B2_LOG_IDPS-ESCAPE_v1.0\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-4b0e36d3 alignfull uagb-is-root-container\">\n<div class=\"wp-block-uagb-container uagb-block-cfcfb01f\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-cd9d8731\"><h2 class=\"uagb-heading-text\">SATRAP-DL (\ud835\udfab release)<\/h2><p class=\"uagb-desc-text\"><strong><span style=\"text-decoration: underline;\">S<\/span><\/strong>emi-<strong><span style=\"text-decoration: underline;\">A<\/span><\/strong>utomated <strong><span style=\"text-decoration: underline;\">T<\/span><\/strong>hreat <strong><span style=\"text-decoration: underline;\">R<\/span><\/strong>econnaissance and <strong><span style=\"text-decoration: underline;\">A<\/span><\/strong>nalysis <strong><span style=\"text-decoration: underline;\">P<\/span><\/strong>owered by <strong><span style=\"text-decoration: underline;\">D<\/span><\/strong>ECIPHER <strong><span style=\"text-decoration: underline;\">L<\/span><\/strong>ogic<br><br>A suite of tools for computer-aided CTI analysis and incident handling, provided by its sub-systems SATRAP and DECIPHER. PyFlowintel, a Python library for interacting with Flowintel, has also been developed within SATRAP-DL.<\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-49b53c70\"><h5 class=\"uagb-heading-text\"><a href=\"https:\/\/abstractionslab.github.io\/satrap-dl\/website\/product-presentation.html\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">SATRAP-DL Product Presentation Website<\/mark><\/a><\/h5><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-a6a363eb\"><h5 class=\"uagb-heading-text\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\"><a href=\"https:\/\/github.com\/AbstractionsLab\/satrap-dl\" target=\"_blank\" rel=\"noreferrer noopener\">SATRAP-DL repository on GitHub<\/a><\/mark><\/h5><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-48b3e033\"><h5 class=\"uagb-heading-text\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\"><a href=\"https:\/\/github.com\/AbstractionsLab\/PyFlowintel\" target=\"_blank\" rel=\"noreferrer noopener\">PyFlowintel repository on GitHub<\/a><\/mark><\/h5><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-34f6fc21\">\n<div class=\"wp-block-uagb-image alignright uagb-block-291c0af5 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-grayscale wp-block-uagb-image--align-right alignwide\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2026\/03\/2D2B2_LOG_SATRAP-DL-Beta-400x400_v1.0-1.png ,https:\/\/abstractionslab.com\/wp-content\/uploads\/2026\/03\/2D2B2_LOG_SATRAP-DL-Beta-400x400_v1.0-1.png 780w, https:\/\/abstractionslab.com\/wp-content\/uploads\/2026\/03\/2D2B2_LOG_SATRAP-DL-Beta-400x400_v1.0-1.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2026\/03\/2D2B2_LOG_SATRAP-DL-Beta-400x400_v1.0-1.png\" alt=\"\" class=\"uag-image-2172\" width=\"300\" height=\"300\" title=\"2D2B2_LOG_SATRAP-DL-Beta-400x400_v1.0\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-489a6aba alignfull uagb-is-root-container\">\n<div class=\"wp-block-uagb-container uagb-layout-flex uagb-block-5a87e373\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-75736386\"><h2 class=\"uagb-heading-text\">C5-DEC (Stable release)<\/h2><p class=\"uagb-desc-text\"><strong><span style=\"text-decoration: underline;\">C<\/span><\/strong>ommon <strong><span style=\"text-decoration: underline;\">C<\/span><\/strong>riteria for <strong><span style=\"text-decoration: underline;\">C<\/span><\/strong>ybersecurity, <strong><span style=\"text-decoration: underline;\">C<\/span><\/strong>ryptography, <strong><span style=\"text-decoration: underline;\">C<\/span><\/strong>louds \u2013 <span style=\"text-decoration: underline;\"><strong>D<\/strong><\/span>esign, <strong><span style=\"text-decoration: underline;\">E<\/span><\/strong>valuation and <strong><span style=\"text-decoration: underline;\">C<\/span><\/strong>ertification<br><br>C5-DEC CAD: AI-enabled toolkit for secure system design following Common Criteria \u2014 CCT (SFR\/SAR, ETR), SSDLC, SpecEngine\/DocEngine, CRA compliance (Annex I\/V\/VII), SBOM lifecycle management, CPSSA (STRIDE\/FAIR), and cryptography (incl. post-quantum), CLI\/TUI\/GUI + VS Code devcontainer<\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-f3e62a50\"><h5 class=\"uagb-heading-text\"><a href=\"https:\/\/abstractionslab.github.io\/c5dec\/website\/product-presentation.html\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">C5-DEC CAD product presentation website<\/mark><\/a> <\/h5><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-bffa6508\"><h5 class=\"uagb-heading-text\"><a data-type=\"link\" data-id=\"https:\/\/github.com\/AbstractionsLab\/c5dec\" href=\"https:\/\/github.com\/AbstractionsLab\/c5dec\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">C5-DEC repository on GitHub<\/mark><\/a><\/h5><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b7c30d3d\">\n<div class=\"wp-block-uagb-image alignright uagb-block-964a3df0 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-grayscale wp-block-uagb-image--align-right alignwide\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2026\/03\/3D3B2B_LOG_C5DEC-DarkLogo-Cropped_v1.2.png ,https:\/\/abstractionslab.com\/wp-content\/uploads\/2026\/03\/3D3B2B_LOG_C5DEC-DarkLogo-Cropped_v1.2.png 780w, https:\/\/abstractionslab.com\/wp-content\/uploads\/2026\/03\/3D3B2B_LOG_C5DEC-DarkLogo-Cropped_v1.2.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2026\/03\/3D3B2B_LOG_C5DEC-DarkLogo-Cropped_v1.2.png\" alt=\"\" class=\"uag-image-2237\" width=\"300\" height=\"300\" title=\"3D3B2B_LOG_C5DEC-DarkLogo-Cropped_v1.2\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-d4eff313 alignfull uagb-is-root-container\">\n<div class=\"wp-block-uagb-container uagb-block-7b399f95\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-80d81a71\"><h2 class=\"uagb-heading-text\">CS-GRAM<\/h2><p class=\"uagb-desc-text\"><strong><span style=\"text-decoration: underline;\">C<\/span><\/strong>loud <strong><span style=\"text-decoration: underline;\">S<\/span><\/strong>ervices: <strong><span style=\"text-decoration: underline;\">G<\/span><\/strong>overnance, <strong><span style=\"text-decoration: underline;\">R<\/span><\/strong>isk management, <strong><span style=\"text-decoration: underline;\">A<\/span><\/strong>udit, <strong><span style=\"text-decoration: underline;\">M<\/span><\/strong>onitoring<br><br>Key tools include OpenTRICK, a full-featured risk management tool, assisting in assessing risk, planning actions, as required by an ISO\/IE 27001 compliant information security management system (ISMS)<\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-e68b46cc\"><h5 class=\"uagb-heading-text\"><a href=\"https:\/\/github.com\/itrust-consulting\/OpenTRICK\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">OpenTRICK repository on GitHub<\/mark><\/a><\/h5><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-427cda3c\">\n<div class=\"wp-block-uagb-image alignright uagb-block-d0dfe764 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-grayscale wp-block-uagb-image--align-right alignwide\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/02\/OpenTrickLogo-300x105.png ,https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/02\/OpenTrickLogo.png 780w, https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/02\/OpenTrickLogo.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/02\/OpenTrickLogo-300x105.png\" alt=\"OpenTRICK logo\" class=\"uag-image-1687\" width=\"300\" height=\"105\" title=\"OpenTrickLogo\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-343c473b alignfull uagb-is-root-container\">\n<div class=\"wp-block-uagb-container uagb-block-f58c6e2c\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8c75c40a\"><h2 class=\"uagb-heading-text\">PQC-MAT<\/h2><\/div>\n\n\n\n<p><span style=\"text-decoration: underline;\">P<\/span>ost-<span style=\"text-decoration: underline;\">Q<\/span>uantum <span style=\"text-decoration: underline;\">C<\/span>ryptography <span style=\"text-decoration: underline;\">M<\/span>igration <span style=\"text-decoration: underline;\">A<\/span>ssistance <span style=\"text-decoration: underline;\">T<\/span>heory and Tools<br><br>A suite of tools bundled under <strong>VECTOR<\/strong> (<strong><span style=\"text-decoration: underline;\">VE<\/span><\/strong>rified <strong><span style=\"text-decoration: underline;\">C<\/span><\/strong>ryptography &amp; <strong><span style=\"text-decoration: underline;\">T<\/span><\/strong>ransition via <strong><span style=\"text-decoration: underline;\">O<\/span><\/strong>bservable <strong><span style=\"text-decoration: underline;\">R<\/span><\/strong>egistry) ranging from cryptography-oriented threat modelling and risk assessment, to verified implementations and asset inventorization<br><\/p>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-06f8d168\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e4d3cbd5\">\n<div class=\"wp-block-uagb-image alignright uagb-block-71701eb3 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-grayscale wp-block-uagb-image--align-right alignwide\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/09\/6D1B2_LOG_PQC-MAT_v1.0-300x300.jpg ,https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/09\/6D1B2_LOG_PQC-MAT_v1.0.jpg 780w, https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/09\/6D1B2_LOG_PQC-MAT_v1.0.jpg 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/09\/6D1B2_LOG_PQC-MAT_v1.0-300x300.jpg\" alt=\"Logo-PQC-MAT\" class=\"uag-image-2002\" width=\"300\" height=\"300\" title=\"6D1B2_LOG_PQC-MAT_v1.0\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-4bc03ce7 alignfull uagb-is-root-container\">\n<div class=\"wp-block-uagb-container uagb-block-28f6ed54\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-e199265d\"><h2 class=\"uagb-heading-text\">DLT-PSaaS<\/h2><\/div>\n\n\n\n<p>Distributed Ledger Technology \u2013 Pseudonymization as a Service<br><\/p>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-f63e864c\"><h5 class=\"uagb-heading-text\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\"><a href=\"https:\/\/wbaas.itrust.lu\/\" target=\"_blank\" rel=\"noreferrer noopener\">WBaaS website<\/a><\/mark><\/h5><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b8305d47\">\n<div class=\"wp-block-uagb-image alignright uagb-block-e019978c wp-block-uagb-image--layout-default wp-block-uagb-image--effect-grayscale wp-block-uagb-image--align-right alignwide\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/09\/WBaaS-logo-300x156.png ,https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/09\/WBaaS-logo.png 780w, https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/09\/WBaaS-logo.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/09\/WBaaS-logo-300x156.png\" alt=\"\" class=\"uag-image-2011\" width=\"300\" height=\"156\" title=\"WBaaS-logo\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-485602c2 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-ae582f56\"><h5 class=\"uagb-heading-text\">CyFORT themes\u200b<\/h5><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-9c7ec6cf\"><h3 class=\"uagb-heading-text\">Post-Quantum Cryptography, Formal Methods, Quantum Computing, automated reasoning, cyber threat intelligence, intrusion detection and prevention, Artificial Intelligence, Threat Modelling and Risk Assessment, Common Criteria, Secure Software Engineering, Verifiable Software, provable Information Security, Secure Software Development Life Cycle, Security Monitoring and Incident Handling<\/h3><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-0cfa4baa alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-2a659ed3\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-e849bf67\"><h3 class=\"uagb-heading-text\">Interested in a collaboration? Contact us!<\/h3><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-4ff07621\">\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-48f19815\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap \">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-b92c5d25 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/abstractionslab.com\/index.php\/contact\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Learn More<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>IDPS-ESCAPE (\ud835\udfab release) Intrusion Detection and Prevention Systems &#8211; Enhanced Security through a Cooperative Anomaly Prediction Engine An open-source SOAR [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":1052,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1373","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CyFORT - Abstractions Lab<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyFORT - Abstractions Lab\" \/>\n<meta property=\"og:description\" content=\"IDPS-ESCAPE (\ud835\udfab release) Intrusion Detection and Prevention Systems &#8211; Enhanced Security through a Cooperative Anomaly Prediction Engine An open-source SOAR [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/\" \/>\n<meta property=\"og:site_name\" content=\"Abstractions Lab\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T16:08:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2023\/11\/ITR-ALab-CyFORT-Logo_v1.0-1024x512.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/\",\"url\":\"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/\",\"name\":\"CyFORT - Abstractions Lab\",\"isPartOf\":{\"@id\":\"https:\/\/abstractionslab.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2023\/11\/ITR-ALab-CyFORT-Logo_v1.0-1024x512.png\",\"datePublished\":\"2024-02-23T12:44:53+00:00\",\"dateModified\":\"2026-03-17T16:08:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/#primaryimage\",\"url\":\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2023\/11\/ITR-ALab-CyFORT-Logo_v1.0.png\",\"contentUrl\":\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2023\/11\/ITR-ALab-CyFORT-Logo_v1.0.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/abstractionslab.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"R&#038;D\",\"item\":\"https:\/\/abstractionslab.com\/index.php\/research-and-development\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CyFORT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/abstractionslab.com\/#website\",\"url\":\"https:\/\/abstractionslab.com\/\",\"name\":\"Abstractions Lab\",\"description\":\"Verifiably secure digital solutions built upon solid mathematical foundations\",\"publisher\":{\"@id\":\"https:\/\/abstractionslab.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/abstractionslab.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/abstractionslab.com\/#organization\",\"name\":\"itrust Abstractions Lab\",\"url\":\"https:\/\/abstractionslab.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/abstractionslab.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/02\/3A1_LOG_AbstractionsLab_v2.0.png\",\"contentUrl\":\"https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/02\/3A1_LOG_AbstractionsLab_v2.0.png\",\"width\":1200,\"height\":600,\"caption\":\"itrust Abstractions Lab\"},\"image\":{\"@id\":\"https:\/\/abstractionslab.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/github.com\/AbstractionsLab\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CyFORT - Abstractions Lab","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/","og_locale":"en_GB","og_type":"article","og_title":"CyFORT - Abstractions Lab","og_description":"IDPS-ESCAPE (\ud835\udfab release) Intrusion Detection and Prevention Systems &#8211; Enhanced Security through a Cooperative Anomaly Prediction Engine An open-source SOAR [&hellip;]","og_url":"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/","og_site_name":"Abstractions Lab","article_modified_time":"2026-03-17T16:08:06+00:00","og_image":[{"url":"https:\/\/abstractionslab.com\/wp-content\/uploads\/2023\/11\/ITR-ALab-CyFORT-Logo_v1.0-1024x512.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/","url":"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/","name":"CyFORT - Abstractions Lab","isPartOf":{"@id":"https:\/\/abstractionslab.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/#primaryimage"},"image":{"@id":"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/#primaryimage"},"thumbnailUrl":"https:\/\/abstractionslab.com\/wp-content\/uploads\/2023\/11\/ITR-ALab-CyFORT-Logo_v1.0-1024x512.png","datePublished":"2024-02-23T12:44:53+00:00","dateModified":"2026-03-17T16:08:06+00:00","breadcrumb":{"@id":"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/#primaryimage","url":"https:\/\/abstractionslab.com\/wp-content\/uploads\/2023\/11\/ITR-ALab-CyFORT-Logo_v1.0.png","contentUrl":"https:\/\/abstractionslab.com\/wp-content\/uploads\/2023\/11\/ITR-ALab-CyFORT-Logo_v1.0.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/abstractionslab.com\/index.php\/research-and-development\/cyfort\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/abstractionslab.com\/"},{"@type":"ListItem","position":2,"name":"R&#038;D","item":"https:\/\/abstractionslab.com\/index.php\/research-and-development\/"},{"@type":"ListItem","position":3,"name":"CyFORT"}]},{"@type":"WebSite","@id":"https:\/\/abstractionslab.com\/#website","url":"https:\/\/abstractionslab.com\/","name":"Abstractions Lab","description":"Verifiably secure digital solutions built upon solid mathematical foundations","publisher":{"@id":"https:\/\/abstractionslab.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abstractionslab.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/abstractionslab.com\/#organization","name":"itrust Abstractions Lab","url":"https:\/\/abstractionslab.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/abstractionslab.com\/#\/schema\/logo\/image\/","url":"https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/02\/3A1_LOG_AbstractionsLab_v2.0.png","contentUrl":"https:\/\/abstractionslab.com\/wp-content\/uploads\/2025\/02\/3A1_LOG_AbstractionsLab_v2.0.png","width":1200,"height":600,"caption":"itrust Abstractions Lab"},"image":{"@id":"https:\/\/abstractionslab.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/github.com\/AbstractionsLab"]}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Arash","author_link":"https:\/\/abstractionslab.com\/index.php\/author\/arash\/"},"uagb_comment_info":0,"uagb_excerpt":"IDPS-ESCAPE (\ud835\udfab release) Intrusion Detection and Prevention Systems &#8211; Enhanced Security through a Cooperative Anomaly Prediction Engine An open-source SOAR [&hellip;]","_links":{"self":[{"href":"https:\/\/abstractionslab.com\/index.php\/wp-json\/wp\/v2\/pages\/1373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abstractionslab.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/abstractionslab.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/abstractionslab.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/abstractionslab.com\/index.php\/wp-json\/wp\/v2\/comments?post=1373"}],"version-history":[{"count":86,"href":"https:\/\/abstractionslab.com\/index.php\/wp-json\/wp\/v2\/pages\/1373\/revisions"}],"predecessor-version":[{"id":2239,"href":"https:\/\/abstractionslab.com\/index.php\/wp-json\/wp\/v2\/pages\/1373\/revisions\/2239"}],"up":[{"embeddable":true,"href":"https:\/\/abstractionslab.com\/index.php\/wp-json\/wp\/v2\/pages\/1052"}],"wp:attachment":[{"href":"https:\/\/abstractionslab.com\/index.php\/wp-json\/wp\/v2\/media?parent=1373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}