Main Functions of (IMPETUS) Tools
Bacteria Detector
Short description of BD |
Continuously monitors air samples to detect abnormally high concentrations of airborne |
Components of BD BD combines two components: a bio-collector (developed by IMT/ UdN) and the Glow and Care which is the bacteria concentration measurement device. The first one acquires a sample of ambient air and catches the bacteria into water, the second one analyses this water to retrieve ambient air bacteria concentration. |
Â
Cyber Threat Intelligence
Short description of CTI |
Detects, classifies and helps mitigate cyberspace threats to an organisation’s IT assets. |
Components of CTI CTI has a few main components:
|
Â
Cyber Threat Detection and Response
Short description of CTDR |
Detects cyber vulnerabilities in IT Systems: raises alerts and suggests countermeasures if they arise. |
Components of CTDR CTDR combines two components: Prelude and ELK Stack. Prelude-ELK is installed as a service on a Docker container, configured to receive syslog files from the components of the monitored system, using events messages on an IP network. |
Â
Workload Monitoring System
Short description of WMS |
Measures mental workload and stress of emergency operators using a brain-computer interface, raises alerts if anomalies arise. |
Components of WMS The WMS tool provides its functionalities two-fold. On premises installation is for the Server component using a docker container and the delivery of pre-configures Data Acquisition Units (DAU's) to the end user. |
Â
Urban Anomaly Detector
Short description of UAD |
Continuously monitors data gathered from multiple city sensors and detects cases deviating from the norm - indicating possible cause for concern. |
Components of UAD The UAD tool provides its functionalities “as-a-service". On premises installation is not available. |
Â
Evacuation Optimiser
Short description of EO |
Provides efficient exodus ways, given possible scenarios. It will be used to better manage organised events (such as a concert) and in case of critical events (such as a criminal attack). The prediction tools developed will consider different variabilities and, in case of alert, it will be used by the police and emergency forces to manage in a better way the citizens exodus and the arrival of the police/first aid operators. In addition, when needed, it will be combined with a comprehensive communication tool. |
Components of EO The EO consists of an external tool for simulating evacuation scenarios.  When provided, data from installed counter-person sensors can be used.  No automatic systems/languages are currently provided to manage the flow of information (i.e. simulation of scenarios and analysis are performed manually by operators). |
Â
Social Media Detection
Short description of SMD |
Scans large volumes of text on social media and other public online sites, looking for topics/keywords that might indicate potential trouble or threats. |
Components of SMD The SMD tool provides its functionalities “as-a-service". On premises installation is not available. |
Â
Firearm Detector
Short description of FD |
Continuously monitors surveillance camera feeds, uses AI (Artificial Intelligence) to analyse images and automatically creates an alert to SOC Operators if a firearm is detected in a public space. |
Components of FD The tool is continuously deployed to monitor and look out for weapons in surveillance camera feeds, without any operator intervention. |
Â
IMPETUS Platform
Short description of IMPETUS Platform |
Integrates multiple tools in a unified interface. |
Components of IMPETUS Platform The IMPETUS Platform centralises the outputs from the tools in a single database and to present them to the users. The data is collected using two methods:
The Platform also deals with the security aspects of communication with the tools and access to the data. The communication with the tools is done using an encrypted channel (using TLS). An authentication mechanism is implemented for tools and users access to the platform, followed by an authorization process – the tools are allowed to submit data only to certain topics from the message broker and the users are allowed to access the UI of the tools corresponding to their roles. The platform consists of a set of docker images that contain the functionalities of the platform. The most important are:
|
Â