SlideShare a Scribd company logo
ZONeSEC early warning
technologies
Jose-Ramon Martinez-Salio
Technical manager of ZONeSEC
Atos
ZONeSEC at a glance
• ZONeSEC: “Towards an EU
framework for the security of Wide
zones”
– Start date: 1 December 2014
– End date: 30 November 2018 (48
months)
http://www.zonesec.eu/
Contact points:
Dimitris Petrantonakis (Project Coordinator)
dpetr@exodussa.com
Jose Ramon Martinez (Technical coordinator)
jose.martinezs@atos.net
2ZONeSEC overview2/10/2018
3ZONeSEC overview2/10/2018
Cyber threats
Physical threats
42/10/2018
Overview of our pilot activities
23/02/2018
4
Y1 Y2 Y3 Y4
PROJECT TIMELINE
Maturitylevel
BetaAlfaTRLlevel
OIP ACC
(M12)
OIP ATTD
(M25)
OIP AQS
(M31)
OIP DESFA
(M37)
PILOTS
ACC
(M40)
AQS
(M43)
ATTD
(M47)
ZONeSEC overview
The second Pilot
2/10/2018 5WP8 – ZONeSEC Framework Design, Development and Integration
The second Pilot demonstration was
hosted by COMPANIA AQUASERV SA at
its premises in Tirgu Mures, Romania,
between 21st and 22nd of June 2018
62/10/20182/10/2018 6
What was included in the second Pilot
WP8 – ZONeSEC Framework Design, Development and Integration
During the Second Pilot we integrated:
• All ZONeSEC Security Capillaries including the
MIMORadar have been successfully integrated and
are running
• Security Clusters have been integrated and are
running. Most processing of sensor signal (Security
Capillaries) has been made distributed over the
Security Clusters
• All security features have been integrated and are
running
• Scalability in processing has been integrated and
has been demonstrated
8ZONeSEC overview2/10/2018
ZONeSEC key technical challenges (1/2)
• Near real time: Time has to be reasonable short
between incident and notification
• No lost of any alert: Alert data should be “reliable”. It
is mandatory that alerts don’t get lost in transit
• No false alerts: Operator need real alerts, not false
alerts
• All kind of networks: All kind of networks are in use
in wide-zones simultaneously
• Flexibility: Plug and play: All the security capillaries
can enter or leave the system at any moment without
affecting the stability of the entire system
• Scalability: The resulting system or framework should
be scalable to any number of security capillaries and
any arbitrary extended area
9ZONeSEC overview2/10/2018
ZONeSEC key technical challenges (2/2)
• Security: Security has to be taken into account in all possible layers
(including tampering the physical devices)
• Portability: The resulting framework should be portable to any
localization
• Legacy sensors: Already existing sensors (aka “legacy sensors”)
should be included in the framework as seamlessly as possible
• Lack of standards in sensor: Every sensor (new or old) has its own
ways of connection and data formats
• Open platform: The system has to be open allowing the possible
addition of new Security capillaries and old legacy systems
• Arbitrary extensive area: Area covered can reach hundreds of km
• Arbitrary number of sensors: The number of sensor involved can be
literally any, including new and old sensors
102/10/2018
10
Solutions adopted in ZONeSEC
The success of ZONeSEC is based in five main
pillars:
1. Modular decoupled architecture with the
use of micro-services
2. Common data model and a common
protocol for all sensors/adaptors
3. Use of a decoupled communications
framework tailored for any kind of
networks and widezones
4. Scalable automatic processing of data
(including fusion of data)
5. Security in devices and in net (including
tampering and cyber)
ZONeSEC overview
Early warning technologies
in ZONeSEC
2/10/2018 13ZONeSEC overview
14ZONeSEC overview2/10/2018
ZONeSEC sensing solutions
The technological solutions used in ZONeSEC are all in the front line of
what technology can offer for CIP
ZONeSEChas:
• Evolved these technologies
to become products in
many cases
• Used these technologies in
the field in real premises
and scenarios
• Integrated all these
heterogenous technologies
and also “legacy systems
Thesetechnologies
include:
• Sensing solutions
• Technological solutions
like UAV, video analytics,
data fusion, data
representation and cyber
attacks detection
15ZONeSEC overview2/10/2018
Sensors on the technological edge (1/3)
• Distributed Acoustic Sensor (IDAS). IDAS is an optoelectronic system
monitoring the acoustic field along an optical fibre cable. Used in
detecting movement near a perimeter set.
• ULTIMA: Ultima is a heat sensor that can be user also for detection of
leakages (gas and liquid).
16ZONeSEC overview2/10/2018
Sensors on the technological edge (2/3)
• Spectral Imaging System: This is a novel multi-sensor system with
thermal, hyperspectral and SWIR cameras. The processing of the huge
amount of spectral video data is locally performed.
17ZONeSEC overview2/10/2018
Sensors on the technological edge (3/3)
• Mimo Radar: (Multiple Input Multiple Output RAdio Detection And
Ranging), detects intrusions of persons into a secure perimeter marked
by a virtual fence. Additionally, the Radar can provide information
about the distance, velocity and azimuth angle of a target.
18ZONeSEC overview2/10/2018
Technological solutions (1/7)
• AUV: The multirotor and Helly type Mini-UAV systems are equipped with
electro-optic sensors including daylight and thermal cameras (CM100V3, UAV
Vision) as well as communication devices.
• receive Orders from the ZONeSEC System and through the Task-Based
Guidance component to prepare the flight plan using analytics
functionalities for decision making and to upload it in order to execute the
mission.
• real-time video stream including metadata (e.g. position, target)
19ZONeSEC overview2/10/2018
Technological solutions (2/7)
• Visual analytics: Video footage coming life from IP cameras or the UAV
is analyzed to detect cars and people in real time.
• Position in KLV format is read and analyzed in real time. Position is
sent to central COP
• Tracking of each object is created
• Modified footage is re-streamed
20ZONeSEC overview2/10/2018
Technological solutions (3/7)
• Abnormal behavior detection: Video footage coming life from IP
cameras is analyzed to detect behavior of people in real time. We
detect movements considered “suspicious” in certain areas.
21ZONeSEC overview2/10/2018
Technological solutions (4/7)
• Cyber agent: Cyber agents are software agents able to detect any cyber
intrusion and to be trained to detect new threats. The multi-agent
system provides continuous analysis of security events in the cyber-
domain, aggregating data from many sources and providing the ability
to consolidate and correlate monitored data to generate reports and
alerts
22ZONeSEC overview2/10/2018
Technological solutions (5/7)
• Data fusion (SDAIM): SDAIM performs data and information fusion to aid and
improve the decision making process of the Widezone operatives. This core
function is fulfilled by data and information fusion algorithms configured and
executed as event stream processing workflows. The output of the fusion
process are alerts for possible illicit situations and behaviours and also
supporting information, aimed at the Widezone operatives, and provided over a
standard messaging interface
Configurable Big Data Technologies & Scalable Cloud Computing
Infrastructure
Fusion Resources
Catalogue
Management UI
Brokered
MOM
Brokered
MOM
AMQP
Data and Information Fusion Algorithms
configured in event stream processing
workflows
Fusion Session Data
Fusion Resources
Agent
Fusion Process Configuration & Session
Instatiation
Knowledge Base
 Domain Semantics
 Knowledge Models
 Fusion Actionable Inf.
Specialised communicaiton
AlertsAMQP
Knowledge
Federation API
Fusion Session
Agent
High Data
Volumes
Remote
Data Fusion
Algorithms
Sensor Networks
Security Clusters
Widezone Geo-data
Access/Import API DBs
23ZONeSEC overview2/10/2018
Technological solutions (6/7)
• COP and simulation of sensors: Common Operational Picture. The COP
displayed a 3D cartographic view of deployed sensors and raised alerts from
subsystems. The simulation tools provided means to add geo-localized virtual
systems and simulate their inputs to ZONeSEC
24ZONeSEC overview2/10/2018
Technological solutions (7/7)
• Security Clusters: The processing of sensors that are related by geographical
criteria or any other common criteria are aggregated locally and processed
locally (using same SDAIM logic). This provides scalability to the full framework.
252/10/2018
One architecture to integrate all together
 Use of a common data model to all ZONeSEC : Data Agreement
initiative has been followed
 Modular architecture has been used for the
core components:
 Core: is the data hub and
communication module
 Micro services: Independent and
modular entities
 Geographical
 Time synchronization
 Metadata
 Historical alerts
 Bidirectional orders
ZONeSEC overview
The third Pilot
2/10/2018 26
The third and final Pilot demonstration will be
held in Athens, Greece, from 25 to 26 of
October 2018. The event will take place at
Atikes Diadormes premises in the Attiki Odos
highway
ZONeSEC overview
272/10/2018 27
What will be included in the third Pilot
• Detection of denial of service (DDos) cyber intrusion
(in the SCADA system) and brute force attack
• Detection of human presence along perimeter fence
areas
• Detection of physical intrusion and movement inside
the secure perimeter
• Detection of trespassing inside facilities
• Remote Mission assignment to Mini-UAV System
operated in ATTD and tracking of suspects
• Legacy system integration (such as traffic and
meteorological data)
• Field data (pictures and operators position) using
mobile COP
This final pilot demonstration will put together all the
efforts made during the entire project.
ZONeSEC overview
282/10/2018
28
Thank you for your time!
Q&A
ZONeSEC overview
Jose Ramon Martinez (Technical coordinator)
jose.martinezs@atos.net

More Related Content

PDF
European smart grid cyber and scada security
PDF
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
PPTX
Training manual on scada
PDF
Protecting data and intellectual property in accelerator-rich architectures w...
PDF
Nist 800 82 ICS Security Auditing Framework
PDF
DTS Solution - SCADA Security Solutions
PPTX
Cyber Security in Substation Automation (IEC 61850)
PPTX
Ics presentation
European smart grid cyber and scada security
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
Training manual on scada
Protecting data and intellectual property in accelerator-rich architectures w...
Nist 800 82 ICS Security Auditing Framework
DTS Solution - SCADA Security Solutions
Cyber Security in Substation Automation (IEC 61850)
Ics presentation

What's hot (20)

PDF
10. industrial networks safety and security tom hammond
PPTX
Classification cyber security threats of modern substation
PDF
The journey to ICS - Extended
PDF
Industrial Control System Security Overview
PPTX
Critical Infrastructure and Security
PPTX
BSidesAugusta ICS SCADA Defense
PDF
CSIRS ICS BCS 2.2
PPTX
Blackhat USA 2016 - What's the DFIRence for ICS?
PPTX
ICS Security 101 by Sandeep Singh
PDF
A Study of Intrusion Detection and Prevention System for Network Security
PDF
Cyber Security: Differences between Industrial Control Systems and ICT Approach
PDF
PT-DTS SCADA Security using MaxPatrol
PDF
Practical analysis of the cybersecurity of European smart grids
PPTX
SCADA Security in CDIC 2009
PPTX
Reconfigurable trust forembeddedcomputingplatforms
PDF
DEF CON 23 - NSM 101 for ICS
PDF
ICS security
PDF
SCADA Security Presentation
PPTX
Scada security
PDF
Securing SCADA
10. industrial networks safety and security tom hammond
Classification cyber security threats of modern substation
The journey to ICS - Extended
Industrial Control System Security Overview
Critical Infrastructure and Security
BSidesAugusta ICS SCADA Defense
CSIRS ICS BCS 2.2
Blackhat USA 2016 - What's the DFIRence for ICS?
ICS Security 101 by Sandeep Singh
A Study of Intrusion Detection and Prevention System for Network Security
Cyber Security: Differences between Industrial Control Systems and ICT Approach
PT-DTS SCADA Security using MaxPatrol
Practical analysis of the cybersecurity of European smart grids
SCADA Security in CDIC 2009
Reconfigurable trust forembeddedcomputingplatforms
DEF CON 23 - NSM 101 for ICS
ICS security
SCADA Security Presentation
Scada security
Securing SCADA
Ad

Similar to ZONeSEC in ERNCIP (20)

PPTX
ZONeSEC: critical infrastructure protection in real practice
PDF
Zonesec_overview_v3
PDF
ZONeSEC_newsletter_issue_6
PDF
ZONeSEC_newsletter_issue_5
PDF
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
PPTX
Industrial Pioneers Days - Machine Learning
PDF
SDI @ISCWest 2017: A Systems Integrator Perspective
PDF
ZONeSEC_newsletter_issue_7
PDF
A0550110
PDF
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
PDF
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
PDF
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
PDF
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
PDF
Real-Time Simulation for MBSE of Synchrophasor Systems
PDF
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
PPTX
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
PDF
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
PDF
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
ZONeSEC: critical infrastructure protection in real practice
Zonesec_overview_v3
ZONeSEC_newsletter_issue_6
ZONeSEC_newsletter_issue_5
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
Industrial Pioneers Days - Machine Learning
SDI @ISCWest 2017: A Systems Integrator Perspective
ZONeSEC_newsletter_issue_7
A0550110
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Real-Time Simulation for MBSE of Synchrophasor Systems
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
HiPEAC2023-DL4IoT Workshop_Jean Hagemeyer presentation
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
Ad

More from José Ramón Martínez Salio (20)

PDF
Press release 3rd pilot
PDF
ZONeSEC final pilot demonstration - invitation and agenda
PDF
Press release 2nd pilot
PDF
Zonesec final event agenda
PDF
ZONeSEC 2nd pilot demonstration - invitation and agenda
PPTX
Simware RTI Empowering hla with dds
PPTX
Nogesi case study as LSA proof of concept
PPTX
PPTX
Omg dds berlin 2013
PPTX
Time managment service over DDS
PPTX
Structural organization of LSA architecture
PPTX
A new approach for converging LVC simulation architectures
PPTX
Simware Simdeveloper
PPTX
Simware framework hello world: A webinar
PPTX
SimWare rti hello world: Webinar
PPTX
SimWare Rti: HLA raised to the power of DDS
PPTX
Nads 2012 itec2012 innovationshowcase 22 may 2012
PDF
DDS en los nuevos retos de Smart Cities
PPTX
SimWare and the new LSA study group on SISO
Press release 3rd pilot
ZONeSEC final pilot demonstration - invitation and agenda
Press release 2nd pilot
Zonesec final event agenda
ZONeSEC 2nd pilot demonstration - invitation and agenda
Simware RTI Empowering hla with dds
Nogesi case study as LSA proof of concept
Omg dds berlin 2013
Time managment service over DDS
Structural organization of LSA architecture
A new approach for converging LVC simulation architectures
Simware Simdeveloper
Simware framework hello world: A webinar
SimWare rti hello world: Webinar
SimWare Rti: HLA raised to the power of DDS
Nads 2012 itec2012 innovationshowcase 22 may 2012
DDS en los nuevos retos de Smart Cities
SimWare and the new LSA study group on SISO

Recently uploaded (20)

PPTX
Construction Project Organization Group 2.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
web development for engineering and engineering
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
Well-logging-methods_new................
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
composite construction of structures.pdf
DOCX
573137875-Attendance-Management-System-original
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Construction Project Organization Group 2.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
web development for engineering and engineering
Foundation to blockchain - A guide to Blockchain Tech
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CYBER-CRIMES AND SECURITY A guide to understanding
Operating System & Kernel Study Guide-1 - converted.pdf
Lesson 3_Tessellation.pptx finite Mathematics
Well-logging-methods_new................
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
composite construction of structures.pdf
573137875-Attendance-Management-System-original
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
OOP with Java - Java Introduction (Basics)
Internet of Things (IOT) - A guide to understanding
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf

ZONeSEC in ERNCIP

  • 1. ZONeSEC early warning technologies Jose-Ramon Martinez-Salio Technical manager of ZONeSEC Atos
  • 2. ZONeSEC at a glance • ZONeSEC: “Towards an EU framework for the security of Wide zones” – Start date: 1 December 2014 – End date: 30 November 2018 (48 months) http://www.zonesec.eu/ Contact points: Dimitris Petrantonakis (Project Coordinator) dpetr@exodussa.com Jose Ramon Martinez (Technical coordinator) jose.martinezs@atos.net 2ZONeSEC overview2/10/2018
  • 4. 42/10/2018 Overview of our pilot activities 23/02/2018 4 Y1 Y2 Y3 Y4 PROJECT TIMELINE Maturitylevel BetaAlfaTRLlevel OIP ACC (M12) OIP ATTD (M25) OIP AQS (M31) OIP DESFA (M37) PILOTS ACC (M40) AQS (M43) ATTD (M47) ZONeSEC overview
  • 5. The second Pilot 2/10/2018 5WP8 – ZONeSEC Framework Design, Development and Integration The second Pilot demonstration was hosted by COMPANIA AQUASERV SA at its premises in Tirgu Mures, Romania, between 21st and 22nd of June 2018
  • 6. 62/10/20182/10/2018 6 What was included in the second Pilot WP8 – ZONeSEC Framework Design, Development and Integration During the Second Pilot we integrated: • All ZONeSEC Security Capillaries including the MIMORadar have been successfully integrated and are running • Security Clusters have been integrated and are running. Most processing of sensor signal (Security Capillaries) has been made distributed over the Security Clusters • All security features have been integrated and are running • Scalability in processing has been integrated and has been demonstrated
  • 7. 8ZONeSEC overview2/10/2018 ZONeSEC key technical challenges (1/2) • Near real time: Time has to be reasonable short between incident and notification • No lost of any alert: Alert data should be “reliable”. It is mandatory that alerts don’t get lost in transit • No false alerts: Operator need real alerts, not false alerts • All kind of networks: All kind of networks are in use in wide-zones simultaneously • Flexibility: Plug and play: All the security capillaries can enter or leave the system at any moment without affecting the stability of the entire system • Scalability: The resulting system or framework should be scalable to any number of security capillaries and any arbitrary extended area
  • 8. 9ZONeSEC overview2/10/2018 ZONeSEC key technical challenges (2/2) • Security: Security has to be taken into account in all possible layers (including tampering the physical devices) • Portability: The resulting framework should be portable to any localization • Legacy sensors: Already existing sensors (aka “legacy sensors”) should be included in the framework as seamlessly as possible • Lack of standards in sensor: Every sensor (new or old) has its own ways of connection and data formats • Open platform: The system has to be open allowing the possible addition of new Security capillaries and old legacy systems • Arbitrary extensive area: Area covered can reach hundreds of km • Arbitrary number of sensors: The number of sensor involved can be literally any, including new and old sensors
  • 9. 102/10/2018 10 Solutions adopted in ZONeSEC The success of ZONeSEC is based in five main pillars: 1. Modular decoupled architecture with the use of micro-services 2. Common data model and a common protocol for all sensors/adaptors 3. Use of a decoupled communications framework tailored for any kind of networks and widezones 4. Scalable automatic processing of data (including fusion of data) 5. Security in devices and in net (including tampering and cyber) ZONeSEC overview
  • 10. Early warning technologies in ZONeSEC 2/10/2018 13ZONeSEC overview
  • 11. 14ZONeSEC overview2/10/2018 ZONeSEC sensing solutions The technological solutions used in ZONeSEC are all in the front line of what technology can offer for CIP ZONeSEChas: • Evolved these technologies to become products in many cases • Used these technologies in the field in real premises and scenarios • Integrated all these heterogenous technologies and also “legacy systems Thesetechnologies include: • Sensing solutions • Technological solutions like UAV, video analytics, data fusion, data representation and cyber attacks detection
  • 12. 15ZONeSEC overview2/10/2018 Sensors on the technological edge (1/3) • Distributed Acoustic Sensor (IDAS). IDAS is an optoelectronic system monitoring the acoustic field along an optical fibre cable. Used in detecting movement near a perimeter set. • ULTIMA: Ultima is a heat sensor that can be user also for detection of leakages (gas and liquid).
  • 13. 16ZONeSEC overview2/10/2018 Sensors on the technological edge (2/3) • Spectral Imaging System: This is a novel multi-sensor system with thermal, hyperspectral and SWIR cameras. The processing of the huge amount of spectral video data is locally performed.
  • 14. 17ZONeSEC overview2/10/2018 Sensors on the technological edge (3/3) • Mimo Radar: (Multiple Input Multiple Output RAdio Detection And Ranging), detects intrusions of persons into a secure perimeter marked by a virtual fence. Additionally, the Radar can provide information about the distance, velocity and azimuth angle of a target.
  • 15. 18ZONeSEC overview2/10/2018 Technological solutions (1/7) • AUV: The multirotor and Helly type Mini-UAV systems are equipped with electro-optic sensors including daylight and thermal cameras (CM100V3, UAV Vision) as well as communication devices. • receive Orders from the ZONeSEC System and through the Task-Based Guidance component to prepare the flight plan using analytics functionalities for decision making and to upload it in order to execute the mission. • real-time video stream including metadata (e.g. position, target)
  • 16. 19ZONeSEC overview2/10/2018 Technological solutions (2/7) • Visual analytics: Video footage coming life from IP cameras or the UAV is analyzed to detect cars and people in real time. • Position in KLV format is read and analyzed in real time. Position is sent to central COP • Tracking of each object is created • Modified footage is re-streamed
  • 17. 20ZONeSEC overview2/10/2018 Technological solutions (3/7) • Abnormal behavior detection: Video footage coming life from IP cameras is analyzed to detect behavior of people in real time. We detect movements considered “suspicious” in certain areas.
  • 18. 21ZONeSEC overview2/10/2018 Technological solutions (4/7) • Cyber agent: Cyber agents are software agents able to detect any cyber intrusion and to be trained to detect new threats. The multi-agent system provides continuous analysis of security events in the cyber- domain, aggregating data from many sources and providing the ability to consolidate and correlate monitored data to generate reports and alerts
  • 19. 22ZONeSEC overview2/10/2018 Technological solutions (5/7) • Data fusion (SDAIM): SDAIM performs data and information fusion to aid and improve the decision making process of the Widezone operatives. This core function is fulfilled by data and information fusion algorithms configured and executed as event stream processing workflows. The output of the fusion process are alerts for possible illicit situations and behaviours and also supporting information, aimed at the Widezone operatives, and provided over a standard messaging interface Configurable Big Data Technologies & Scalable Cloud Computing Infrastructure Fusion Resources Catalogue Management UI Brokered MOM Brokered MOM AMQP Data and Information Fusion Algorithms configured in event stream processing workflows Fusion Session Data Fusion Resources Agent Fusion Process Configuration & Session Instatiation Knowledge Base  Domain Semantics  Knowledge Models  Fusion Actionable Inf. Specialised communicaiton AlertsAMQP Knowledge Federation API Fusion Session Agent High Data Volumes Remote Data Fusion Algorithms Sensor Networks Security Clusters Widezone Geo-data Access/Import API DBs
  • 20. 23ZONeSEC overview2/10/2018 Technological solutions (6/7) • COP and simulation of sensors: Common Operational Picture. The COP displayed a 3D cartographic view of deployed sensors and raised alerts from subsystems. The simulation tools provided means to add geo-localized virtual systems and simulate their inputs to ZONeSEC
  • 21. 24ZONeSEC overview2/10/2018 Technological solutions (7/7) • Security Clusters: The processing of sensors that are related by geographical criteria or any other common criteria are aggregated locally and processed locally (using same SDAIM logic). This provides scalability to the full framework.
  • 22. 252/10/2018 One architecture to integrate all together  Use of a common data model to all ZONeSEC : Data Agreement initiative has been followed  Modular architecture has been used for the core components:  Core: is the data hub and communication module  Micro services: Independent and modular entities  Geographical  Time synchronization  Metadata  Historical alerts  Bidirectional orders ZONeSEC overview
  • 23. The third Pilot 2/10/2018 26 The third and final Pilot demonstration will be held in Athens, Greece, from 25 to 26 of October 2018. The event will take place at Atikes Diadormes premises in the Attiki Odos highway ZONeSEC overview
  • 24. 272/10/2018 27 What will be included in the third Pilot • Detection of denial of service (DDos) cyber intrusion (in the SCADA system) and brute force attack • Detection of human presence along perimeter fence areas • Detection of physical intrusion and movement inside the secure perimeter • Detection of trespassing inside facilities • Remote Mission assignment to Mini-UAV System operated in ATTD and tracking of suspects • Legacy system integration (such as traffic and meteorological data) • Field data (pictures and operators position) using mobile COP This final pilot demonstration will put together all the efforts made during the entire project. ZONeSEC overview
  • 25. 282/10/2018 28 Thank you for your time! Q&A ZONeSEC overview Jose Ramon Martinez (Technical coordinator) jose.martinezs@atos.net

Editor's Notes