SlideShare una empresa de Scribd logo
1 de 25
ZONeSEC early warning
technologies
Jose-Ramon Martinez-Salio
Technical manager of ZONeSEC
Atos
ZONeSEC at a glance
• ZONeSEC: “Towards an EU
framework for the security of Wide
zones”
– Start date: 1 December 2014
– End date: 30 November 2018 (48
months)
http://www.zonesec.eu/
Contact points:
Dimitris Petrantonakis (Project Coordinator)
dpetr@exodussa.com
Jose Ramon Martinez (Technical coordinator)
jose.martinezs@atos.net
2ZONeSEC overview2/10/2018
3ZONeSEC overview2/10/2018
Cyber threats
Physical threats
42/10/2018
Overview of our pilot activities
23/02/2018
4
Y1 Y2 Y3 Y4
PROJECT TIMELINE
Maturitylevel
BetaAlfaTRLlevel
OIP ACC
(M12)
OIP ATTD
(M25)
OIP AQS
(M31)
OIP DESFA
(M37)
PILOTS
ACC
(M40)
AQS
(M43)
ATTD
(M47)
ZONeSEC overview
The second Pilot
2/10/2018 5WP8 – ZONeSEC Framework Design, Development and Integration
The second Pilot demonstration was
hosted by COMPANIA AQUASERV SA at
its premises in Tirgu Mures, Romania,
between 21st and 22nd of June 2018
62/10/20182/10/2018 6
What was included in the second Pilot
WP8 – ZONeSEC Framework Design, Development and Integration
During the Second Pilot we integrated:
• All ZONeSEC Security Capillaries including the
MIMORadar have been successfully integrated and
are running
• Security Clusters have been integrated and are
running. Most processing of sensor signal (Security
Capillaries) has been made distributed over the
Security Clusters
• All security features have been integrated and are
running
• Scalability in processing has been integrated and
has been demonstrated
8ZONeSEC overview2/10/2018
ZONeSEC key technical challenges (1/2)
• Near real time: Time has to be reasonable short
between incident and notification
• No lost of any alert: Alert data should be “reliable”. It
is mandatory that alerts don’t get lost in transit
• No false alerts: Operator need real alerts, not false
alerts
• All kind of networks: All kind of networks are in use
in wide-zones simultaneously
• Flexibility: Plug and play: All the security capillaries
can enter or leave the system at any moment without
affecting the stability of the entire system
• Scalability: The resulting system or framework should
be scalable to any number of security capillaries and
any arbitrary extended area
9ZONeSEC overview2/10/2018
ZONeSEC key technical challenges (2/2)
• Security: Security has to be taken into account in all possible layers
(including tampering the physical devices)
• Portability: The resulting framework should be portable to any
localization
• Legacy sensors: Already existing sensors (aka “legacy sensors”)
should be included in the framework as seamlessly as possible
• Lack of standards in sensor: Every sensor (new or old) has its own
ways of connection and data formats
• Open platform: The system has to be open allowing the possible
addition of new Security capillaries and old legacy systems
• Arbitrary extensive area: Area covered can reach hundreds of km
• Arbitrary number of sensors: The number of sensor involved can be
literally any, including new and old sensors
102/10/2018
10
Solutions adopted in ZONeSEC
The success of ZONeSEC is based in five main
pillars:
1. Modular decoupled architecture with the
use of micro-services
2. Common data model and a common
protocol for all sensors/adaptors
3. Use of a decoupled communications
framework tailored for any kind of
networks and widezones
4. Scalable automatic processing of data
(including fusion of data)
5. Security in devices and in net (including
tampering and cyber)
ZONeSEC overview
Early warning technologies
in ZONeSEC
2/10/2018 13ZONeSEC overview
14ZONeSEC overview2/10/2018
ZONeSEC sensing solutions
The technological solutions used in ZONeSEC are all in the front line of
what technology can offer for CIP
ZONeSEChas:
• Evolved these technologies
to become products in
many cases
• Used these technologies in
the field in real premises
and scenarios
• Integrated all these
heterogenous technologies
and also “legacy systems
Thesetechnologies
include:
• Sensing solutions
• Technological solutions
like UAV, video analytics,
data fusion, data
representation and cyber
attacks detection
15ZONeSEC overview2/10/2018
Sensors on the technological edge (1/3)
• Distributed Acoustic Sensor (IDAS). IDAS is an optoelectronic system
monitoring the acoustic field along an optical fibre cable. Used in
detecting movement near a perimeter set.
• ULTIMA: Ultima is a heat sensor that can be user also for detection of
leakages (gas and liquid).
16ZONeSEC overview2/10/2018
Sensors on the technological edge (2/3)
• Spectral Imaging System: This is a novel multi-sensor system with
thermal, hyperspectral and SWIR cameras. The processing of the huge
amount of spectral video data is locally performed.
17ZONeSEC overview2/10/2018
Sensors on the technological edge (3/3)
• Mimo Radar: (Multiple Input Multiple Output RAdio Detection And
Ranging), detects intrusions of persons into a secure perimeter marked
by a virtual fence. Additionally, the Radar can provide information
about the distance, velocity and azimuth angle of a target.
18ZONeSEC overview2/10/2018
Technological solutions (1/7)
• AUV: The multirotor and Helly type Mini-UAV systems are equipped with
electro-optic sensors including daylight and thermal cameras (CM100V3, UAV
Vision) as well as communication devices.
• receive Orders from the ZONeSEC System and through the Task-Based
Guidance component to prepare the flight plan using analytics
functionalities for decision making and to upload it in order to execute the
mission.
• real-time video stream including metadata (e.g. position, target)
19ZONeSEC overview2/10/2018
Technological solutions (2/7)
• Visual analytics: Video footage coming life from IP cameras or the UAV
is analyzed to detect cars and people in real time.
• Position in KLV format is read and analyzed in real time. Position is
sent to central COP
• Tracking of each object is created
• Modified footage is re-streamed
20ZONeSEC overview2/10/2018
Technological solutions (3/7)
• Abnormal behavior detection: Video footage coming life from IP
cameras is analyzed to detect behavior of people in real time. We
detect movements considered “suspicious” in certain areas.
21ZONeSEC overview2/10/2018
Technological solutions (4/7)
• Cyber agent: Cyber agents are software agents able to detect any cyber
intrusion and to be trained to detect new threats. The multi-agent
system provides continuous analysis of security events in the cyber-
domain, aggregating data from many sources and providing the ability
to consolidate and correlate monitored data to generate reports and
alerts
22ZONeSEC overview2/10/2018
Technological solutions (5/7)
• Data fusion (SDAIM): SDAIM performs data and information fusion to aid and
improve the decision making process of the Widezone operatives. This core
function is fulfilled by data and information fusion algorithms configured and
executed as event stream processing workflows. The output of the fusion
process are alerts for possible illicit situations and behaviours and also
supporting information, aimed at the Widezone operatives, and provided over a
standard messaging interface
Configurable Big Data Technologies & Scalable Cloud Computing
Infrastructure
Fusion Resources
Catalogue
Management UI
Brokered
MOM
Brokered
MOM
AMQP
Data and Information Fusion Algorithms
configured in event stream processing
workflows
Fusion Session Data
Fusion Resources
Agent
Fusion Process Configuration & Session
Instatiation
Knowledge Base
 Domain Semantics
 Knowledge Models
 Fusion Actionable Inf.
Specialised communicaiton
AlertsAMQP
Knowledge
Federation API
Fusion Session
Agent
High Data
Volumes
Remote
Data Fusion
Algorithms
Sensor Networks
Security Clusters
Widezone Geo-data
Access/Import API DBs
23ZONeSEC overview2/10/2018
Technological solutions (6/7)
• COP and simulation of sensors: Common Operational Picture. The COP
displayed a 3D cartographic view of deployed sensors and raised alerts from
subsystems. The simulation tools provided means to add geo-localized virtual
systems and simulate their inputs to ZONeSEC
24ZONeSEC overview2/10/2018
Technological solutions (7/7)
• Security Clusters: The processing of sensors that are related by geographical
criteria or any other common criteria are aggregated locally and processed
locally (using same SDAIM logic). This provides scalability to the full framework.
252/10/2018
One architecture to integrate all together
 Use of a common data model to all ZONeSEC : Data Agreement
initiative has been followed
 Modular architecture has been used for the
core components:
 Core: is the data hub and
communication module
 Micro services: Independent and
modular entities
 Geographical
 Time synchronization
 Metadata
 Historical alerts
 Bidirectional orders
ZONeSEC overview
The third Pilot
2/10/2018 26
The third and final Pilot demonstration will be
held in Athens, Greece, from 25 to 26 of
October 2018. The event will take place at
Atikes Diadormes premises in the Attiki Odos
highway
ZONeSEC overview
272/10/2018 27
What will be included in the third Pilot
• Detection of denial of service (DDos) cyber intrusion
(in the SCADA system) and brute force attack
• Detection of human presence along perimeter fence
areas
• Detection of physical intrusion and movement inside
the secure perimeter
• Detection of trespassing inside facilities
• Remote Mission assignment to Mini-UAV System
operated in ATTD and tracking of suspects
• Legacy system integration (such as traffic and
meteorological data)
• Field data (pictures and operators position) using
mobile COP
This final pilot demonstration will put together all the
efforts made during the entire project.
ZONeSEC overview
282/10/2018
28
Thank you for your time!
Q&A
ZONeSEC overview
Jose Ramon Martinez (Technical coordinator)
jose.martinezs@atos.net

Más contenido relacionado

La actualidad más candente

PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
Shah Sheikh
 

La actualidad más candente (20)

10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
 
Classification cyber security threats of modern substation
Classification cyber security threats of modern substationClassification cyber security threats of modern substation
Classification cyber security threats of modern substation
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
 
Critical Infrastructure and Security
Critical Infrastructure and SecurityCritical Infrastructure and Security
Critical Infrastructure and Security
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2
 
Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
A Study of Intrusion Detection and Prevention System for Network Security
A Study of Intrusion Detection and Prevention System for Network SecurityA Study of Intrusion Detection and Prevention System for Network Security
A Study of Intrusion Detection and Prevention System for Network Security
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
 
SCADA Security in CDIC 2009
SCADA Security in CDIC 2009SCADA Security in CDIC 2009
SCADA Security in CDIC 2009
 
Reconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatformsReconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatforms
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 
ICS security
ICS securityICS security
ICS security
 
SCADA Security Presentation
SCADA Security PresentationSCADA Security Presentation
SCADA Security Presentation
 
Scada security
Scada securityScada security
Scada security
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 

Similar a ZONeSEC in ERNCIP

Real-Time Simulation for MBSE of Synchrophasor Systems
Real-Time Simulation for MBSE of Synchrophasor SystemsReal-Time Simulation for MBSE of Synchrophasor Systems
Real-Time Simulation for MBSE of Synchrophasor Systems
Luigi Vanfretti
 

Similar a ZONeSEC in ERNCIP (20)

ZONeSEC: critical infrastructure protection in real practice
ZONeSEC: critical infrastructure protection in real practice ZONeSEC: critical infrastructure protection in real practice
ZONeSEC: critical infrastructure protection in real practice
 
Zonesec_overview_v3
Zonesec_overview_v3Zonesec_overview_v3
Zonesec_overview_v3
 
Zonesec_ares
Zonesec_aresZonesec_ares
Zonesec_ares
 
ZONeSEC_newsletter_issue_6
ZONeSEC_newsletter_issue_6ZONeSEC_newsletter_issue_6
ZONeSEC_newsletter_issue_6
 
ZONeSEC_newsletter_issue_5
ZONeSEC_newsletter_issue_5ZONeSEC_newsletter_issue_5
ZONeSEC_newsletter_issue_5
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
 
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine Learning
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
 
ZONeSEC_newsletter_issue_7
ZONeSEC_newsletter_issue_7ZONeSEC_newsletter_issue_7
ZONeSEC_newsletter_issue_7
 
A0550110
A0550110A0550110
A0550110
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
 
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesSmartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
 
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...Ieeepro techno solutions    ieee 2013 embedded project  smartdust network for...
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
 
Real-Time Simulation for MBSE of Synchrophasor Systems
Real-Time Simulation for MBSE of Synchrophasor SystemsReal-Time Simulation for MBSE of Synchrophasor Systems
Real-Time Simulation for MBSE of Synchrophasor Systems
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
 
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentationHiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
 
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
 
Thales
ThalesThales
Thales
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
 

Más de José Ramón Martínez Salio

Más de José Ramón Martínez Salio (20)

Press release 3rd pilot
Press release 3rd pilotPress release 3rd pilot
Press release 3rd pilot
 
ZONeSEC final pilot demonstration - invitation and agenda
ZONeSEC final pilot demonstration - invitation and agendaZONeSEC final pilot demonstration - invitation and agenda
ZONeSEC final pilot demonstration - invitation and agenda
 
Press release 2nd pilot
Press release 2nd pilotPress release 2nd pilot
Press release 2nd pilot
 
Zonesec final event agenda
Zonesec final event agendaZonesec final event agenda
Zonesec final event agenda
 
ZONeSEC 2nd pilot demonstration - invitation and agenda
ZONeSEC 2nd pilot demonstration - invitation and agendaZONeSEC 2nd pilot demonstration - invitation and agenda
ZONeSEC 2nd pilot demonstration - invitation and agenda
 
Simware RTI Empowering hla with dds
Simware RTI Empowering hla with ddsSimware RTI Empowering hla with dds
Simware RTI Empowering hla with dds
 
Nogesi case study as LSA proof of concept
Nogesi case study as LSA proof of conceptNogesi case study as LSA proof of concept
Nogesi case study as LSA proof of concept
 
Simware in full
Simware in fullSimware in full
Simware in full
 
Omg dds berlin 2013
Omg dds berlin 2013Omg dds berlin 2013
Omg dds berlin 2013
 
Time managment service over DDS
Time managment service over DDSTime managment service over DDS
Time managment service over DDS
 
Structural organization of LSA architecture
Structural organization of LSA architectureStructural organization of LSA architecture
Structural organization of LSA architecture
 
A new approach for converging LVC simulation architectures
A new approach for converging LVC simulation architecturesA new approach for converging LVC simulation architectures
A new approach for converging LVC simulation architectures
 
Simware Simdeveloper
Simware SimdeveloperSimware Simdeveloper
Simware Simdeveloper
 
Simware framework hello world: A webinar
Simware framework hello world: A webinarSimware framework hello world: A webinar
Simware framework hello world: A webinar
 
SimWare rti hello world: Webinar
SimWare rti hello world: WebinarSimWare rti hello world: Webinar
SimWare rti hello world: Webinar
 
SimWare Rti: HLA raised to the power of DDS
SimWare Rti: HLA raised to the power of DDSSimWare Rti: HLA raised to the power of DDS
SimWare Rti: HLA raised to the power of DDS
 
Nads 2012 itec2012 innovationshowcase 22 may 2012
Nads 2012 itec2012 innovationshowcase 22 may 2012 Nads 2012 itec2012 innovationshowcase 22 may 2012
Nads 2012 itec2012 innovationshowcase 22 may 2012
 
DDS en los nuevos retos de Smart Cities
DDS en los nuevos retos de Smart CitiesDDS en los nuevos retos de Smart Cities
DDS en los nuevos retos de Smart Cities
 
SimWare and the new LSA study group on SISO
SimWare and the new LSA study group on SISOSimWare and the new LSA study group on SISO
SimWare and the new LSA study group on SISO
 
HLA over DDS
HLA over DDSHLA over DDS
HLA over DDS
 

Último

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Último (20)

HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 

ZONeSEC in ERNCIP

  • 1. ZONeSEC early warning technologies Jose-Ramon Martinez-Salio Technical manager of ZONeSEC Atos
  • 2. ZONeSEC at a glance • ZONeSEC: “Towards an EU framework for the security of Wide zones” – Start date: 1 December 2014 – End date: 30 November 2018 (48 months) http://www.zonesec.eu/ Contact points: Dimitris Petrantonakis (Project Coordinator) dpetr@exodussa.com Jose Ramon Martinez (Technical coordinator) jose.martinezs@atos.net 2ZONeSEC overview2/10/2018
  • 4. 42/10/2018 Overview of our pilot activities 23/02/2018 4 Y1 Y2 Y3 Y4 PROJECT TIMELINE Maturitylevel BetaAlfaTRLlevel OIP ACC (M12) OIP ATTD (M25) OIP AQS (M31) OIP DESFA (M37) PILOTS ACC (M40) AQS (M43) ATTD (M47) ZONeSEC overview
  • 5. The second Pilot 2/10/2018 5WP8 – ZONeSEC Framework Design, Development and Integration The second Pilot demonstration was hosted by COMPANIA AQUASERV SA at its premises in Tirgu Mures, Romania, between 21st and 22nd of June 2018
  • 6. 62/10/20182/10/2018 6 What was included in the second Pilot WP8 – ZONeSEC Framework Design, Development and Integration During the Second Pilot we integrated: • All ZONeSEC Security Capillaries including the MIMORadar have been successfully integrated and are running • Security Clusters have been integrated and are running. Most processing of sensor signal (Security Capillaries) has been made distributed over the Security Clusters • All security features have been integrated and are running • Scalability in processing has been integrated and has been demonstrated
  • 7. 8ZONeSEC overview2/10/2018 ZONeSEC key technical challenges (1/2) • Near real time: Time has to be reasonable short between incident and notification • No lost of any alert: Alert data should be “reliable”. It is mandatory that alerts don’t get lost in transit • No false alerts: Operator need real alerts, not false alerts • All kind of networks: All kind of networks are in use in wide-zones simultaneously • Flexibility: Plug and play: All the security capillaries can enter or leave the system at any moment without affecting the stability of the entire system • Scalability: The resulting system or framework should be scalable to any number of security capillaries and any arbitrary extended area
  • 8. 9ZONeSEC overview2/10/2018 ZONeSEC key technical challenges (2/2) • Security: Security has to be taken into account in all possible layers (including tampering the physical devices) • Portability: The resulting framework should be portable to any localization • Legacy sensors: Already existing sensors (aka “legacy sensors”) should be included in the framework as seamlessly as possible • Lack of standards in sensor: Every sensor (new or old) has its own ways of connection and data formats • Open platform: The system has to be open allowing the possible addition of new Security capillaries and old legacy systems • Arbitrary extensive area: Area covered can reach hundreds of km • Arbitrary number of sensors: The number of sensor involved can be literally any, including new and old sensors
  • 9. 102/10/2018 10 Solutions adopted in ZONeSEC The success of ZONeSEC is based in five main pillars: 1. Modular decoupled architecture with the use of micro-services 2. Common data model and a common protocol for all sensors/adaptors 3. Use of a decoupled communications framework tailored for any kind of networks and widezones 4. Scalable automatic processing of data (including fusion of data) 5. Security in devices and in net (including tampering and cyber) ZONeSEC overview
  • 10. Early warning technologies in ZONeSEC 2/10/2018 13ZONeSEC overview
  • 11. 14ZONeSEC overview2/10/2018 ZONeSEC sensing solutions The technological solutions used in ZONeSEC are all in the front line of what technology can offer for CIP ZONeSEChas: • Evolved these technologies to become products in many cases • Used these technologies in the field in real premises and scenarios • Integrated all these heterogenous technologies and also “legacy systems Thesetechnologies include: • Sensing solutions • Technological solutions like UAV, video analytics, data fusion, data representation and cyber attacks detection
  • 12. 15ZONeSEC overview2/10/2018 Sensors on the technological edge (1/3) • Distributed Acoustic Sensor (IDAS). IDAS is an optoelectronic system monitoring the acoustic field along an optical fibre cable. Used in detecting movement near a perimeter set. • ULTIMA: Ultima is a heat sensor that can be user also for detection of leakages (gas and liquid).
  • 13. 16ZONeSEC overview2/10/2018 Sensors on the technological edge (2/3) • Spectral Imaging System: This is a novel multi-sensor system with thermal, hyperspectral and SWIR cameras. The processing of the huge amount of spectral video data is locally performed.
  • 14. 17ZONeSEC overview2/10/2018 Sensors on the technological edge (3/3) • Mimo Radar: (Multiple Input Multiple Output RAdio Detection And Ranging), detects intrusions of persons into a secure perimeter marked by a virtual fence. Additionally, the Radar can provide information about the distance, velocity and azimuth angle of a target.
  • 15. 18ZONeSEC overview2/10/2018 Technological solutions (1/7) • AUV: The multirotor and Helly type Mini-UAV systems are equipped with electro-optic sensors including daylight and thermal cameras (CM100V3, UAV Vision) as well as communication devices. • receive Orders from the ZONeSEC System and through the Task-Based Guidance component to prepare the flight plan using analytics functionalities for decision making and to upload it in order to execute the mission. • real-time video stream including metadata (e.g. position, target)
  • 16. 19ZONeSEC overview2/10/2018 Technological solutions (2/7) • Visual analytics: Video footage coming life from IP cameras or the UAV is analyzed to detect cars and people in real time. • Position in KLV format is read and analyzed in real time. Position is sent to central COP • Tracking of each object is created • Modified footage is re-streamed
  • 17. 20ZONeSEC overview2/10/2018 Technological solutions (3/7) • Abnormal behavior detection: Video footage coming life from IP cameras is analyzed to detect behavior of people in real time. We detect movements considered “suspicious” in certain areas.
  • 18. 21ZONeSEC overview2/10/2018 Technological solutions (4/7) • Cyber agent: Cyber agents are software agents able to detect any cyber intrusion and to be trained to detect new threats. The multi-agent system provides continuous analysis of security events in the cyber- domain, aggregating data from many sources and providing the ability to consolidate and correlate monitored data to generate reports and alerts
  • 19. 22ZONeSEC overview2/10/2018 Technological solutions (5/7) • Data fusion (SDAIM): SDAIM performs data and information fusion to aid and improve the decision making process of the Widezone operatives. This core function is fulfilled by data and information fusion algorithms configured and executed as event stream processing workflows. The output of the fusion process are alerts for possible illicit situations and behaviours and also supporting information, aimed at the Widezone operatives, and provided over a standard messaging interface Configurable Big Data Technologies & Scalable Cloud Computing Infrastructure Fusion Resources Catalogue Management UI Brokered MOM Brokered MOM AMQP Data and Information Fusion Algorithms configured in event stream processing workflows Fusion Session Data Fusion Resources Agent Fusion Process Configuration & Session Instatiation Knowledge Base  Domain Semantics  Knowledge Models  Fusion Actionable Inf. Specialised communicaiton AlertsAMQP Knowledge Federation API Fusion Session Agent High Data Volumes Remote Data Fusion Algorithms Sensor Networks Security Clusters Widezone Geo-data Access/Import API DBs
  • 20. 23ZONeSEC overview2/10/2018 Technological solutions (6/7) • COP and simulation of sensors: Common Operational Picture. The COP displayed a 3D cartographic view of deployed sensors and raised alerts from subsystems. The simulation tools provided means to add geo-localized virtual systems and simulate their inputs to ZONeSEC
  • 21. 24ZONeSEC overview2/10/2018 Technological solutions (7/7) • Security Clusters: The processing of sensors that are related by geographical criteria or any other common criteria are aggregated locally and processed locally (using same SDAIM logic). This provides scalability to the full framework.
  • 22. 252/10/2018 One architecture to integrate all together  Use of a common data model to all ZONeSEC : Data Agreement initiative has been followed  Modular architecture has been used for the core components:  Core: is the data hub and communication module  Micro services: Independent and modular entities  Geographical  Time synchronization  Metadata  Historical alerts  Bidirectional orders ZONeSEC overview
  • 23. The third Pilot 2/10/2018 26 The third and final Pilot demonstration will be held in Athens, Greece, from 25 to 26 of October 2018. The event will take place at Atikes Diadormes premises in the Attiki Odos highway ZONeSEC overview
  • 24. 272/10/2018 27 What will be included in the third Pilot • Detection of denial of service (DDos) cyber intrusion (in the SCADA system) and brute force attack • Detection of human presence along perimeter fence areas • Detection of physical intrusion and movement inside the secure perimeter • Detection of trespassing inside facilities • Remote Mission assignment to Mini-UAV System operated in ATTD and tracking of suspects • Legacy system integration (such as traffic and meteorological data) • Field data (pictures and operators position) using mobile COP This final pilot demonstration will put together all the efforts made during the entire project. ZONeSEC overview
  • 25. 282/10/2018 28 Thank you for your time! Q&A ZONeSEC overview Jose Ramon Martinez (Technical coordinator) jose.martinezs@atos.net

Notas del editor

  1. 2
  2. 7