Main Functions of (IMPETUS) Tools

Bacteria Detector

Short description of BD

Continuously monitors air samples to detect abnormally high concentrations of airborne
bacteria.

Components of BD

BD combines two components: a bio-collector (developed by IMT/ UdN) and the Glow and Care which is the bacteria concentration measurement device. The first one acquires a sample of ambient air and catches the bacteria into water, the second one analyses this water to retrieve ambient air bacteria concentration.

 

Cyber Threat Intelligence

Short description of CTI

Detects, classifies and helps mitigate cyberspace threats to an organisation’s IT assets.

Components of CTI

CTI has a few main components:

  1. Manual Investigation - Deep dive into any escalation in real-time and understand the context.

  2. Actionable Alerts - Pre-configured and automatically updated alerts and insights according to vertical and use case.

  3. DVE Module - predicts the immediate risks of vulnerabilities with a higher probability of being exploited.

  4. Case Management - Allows the user to track and manage an ongoing investigation by attaching pieces of information under a specific case, as well as sharing this information and progress with other colleagues.

 

Cyber Threat Detection and Response

Short description of CTDR

Detects cyber vulnerabilities in IT Systems: raises alerts and suggests countermeasures if they arise.

Components of CTDR

CTDR combines two components: Prelude and ELK Stack. Prelude-ELK is installed as a service on a Docker container, configured to receive syslog files from the components of the monitored system, using events messages on an IP network.

 

Workload Monitoring System

Short description of WMS

Measures mental workload and stress of emergency operators using a brain-computer interface, raises alerts if anomalies arise.

Components of WMS

The WMS tool provides its functionalities two-fold. On premises installation is for the Server component using a docker container and the delivery of pre-configures Data Acquisition Units (DAU's) to the end user.

 

Urban Anomaly Detector

Short description of UAD

Continuously monitors data gathered from multiple city sensors and detects cases deviating from the norm - indicating possible cause for concern.

Components of UAD

The UAD tool provides its functionalities “as-a-service". On premises installation is not available.

 

Evacuation Optimiser

Short description of EO

Provides efficient exodus ways, given possible scenarios. It will be used to better manage organised events (such as a concert) and in case of critical events (such as a criminal attack). The prediction tools developed will consider different variabilities and, in case of alert, it will be used by the police and emergency forces to manage in a better way the citizens exodus and the arrival of the police/first aid operators. In addition, when needed, it will be combined with a comprehensive communication tool. 

Components of EO

The EO consists of an external tool for simulating evacuation scenarios.  When provided, data from installed counter-person sensors can be used.  No automatic systems/languages are currently provided to manage the flow of information (i.e. simulation of scenarios and analysis are performed manually by operators). 

 

Social Media Detection

Short description of SMD

Scans large volumes of text on social media and other public online sites, looking for topics/keywords that might indicate potential trouble or threats.

Components of SMD

The SMD tool provides its functionalities “as-a-service". On premises installation is not available.

 

Firearm Detector

Short description of FD

Continuously monitors surveillance camera feeds, uses AI (Artificial Intelligence) to analyse images and automatically creates an alert to SOC Operators if a firearm is detected in a public space.

Components of FD

The tool is continuously deployed to monitor and look out for weapons in surveillance camera feeds, without any operator intervention. 

 

IMPETUS Platform

Short description of IMPETUS Platform

Integrates multiple tools in a unified interface.

Components of IMPETUS Platform

The IMPETUS Platform centralises the outputs from the tools in a single database and to present them to the users. The data is collected using two methods:

  • API that is called by the platform (CTI)

  • a message broker to which the tools push the data structured as JSON (all other tools)

The Platform also deals with the security aspects of communication with the tools and access to the data. The communication with the tools is done using an encrypted channel (using TLS). An authentication mechanism is implemented for tools and users access to the platform, followed by an authorization process – the tools are allowed to submit data only to certain topics from the message broker and the users are allowed to access the UI of the tools corresponding to their roles.

The platform consists of a set of docker images that contain the functionalities of the platform. The most important are:

  • dashboard – contains the web application that implements the user interface of the platform

  • dashboard-cron – contains jobs that run at regular intervals in order to prepare data that is presented in the user interface

  • iotapp-nr1 – contains a nodered instance used to create flows that get the data from the kafka message broker, transforms it and saves it in the database

  • kafka – contains the message broker used to receive the data from the tools

  • dashboarddb - contains the database used by the platform

  • ldap-server – contains an openldap installation for managing the users and their roles in the platform

  • keycloak – contains keycloak, an open source identity and access management solution, that is used to offer SSO capabilities for the components of the platform

  • rocketchat – contains an installation of a messaging system

  • mongo – contains the database used by rocketchat

  • wd-ui – contains the user interface of the FD tool

  • wd – contains the backend of the FD tool

Â