Technical Information on (IMPETUS) tools
Bacteria Detector
Components of Bacteria Detector BD combines two components: a bio-collector (developed by IMT/ UdN) and the Glow and Care which is the bacteria concentration measurement device. The first one acquires a sample of ambient air and catches the bacteria into water, the second one analyses this water to retrieve ambient air bacteria concentration. |
Cyber Threat Intelligence
Components of Cyber Threat Intelligence CTI has a few main components:
|
Cyber Threat Detection and Response
Components of Cyber Threat Detection and Response CTDR combines two components: Prelude and ELK Stack. Prelude-ELK is installed as a service on a Docker container, configured to receive syslog files from the components of the monitored system, using events messages on an IP network. |
Workload Monitoring System
Components of Workload Monitoring System The WMS tool provides its functionalities two-fold. On premises installation is for the Server component using a docker container and the delivery of pre-configures Data Acquisition Units (DAU's) to the end user. |
Urban Anomaly Detector
Components of Urban Anomaly Detector The UAD tool provides its functionalities “as-a-service". On premises installation is not available. |
Evacuation Optimiser
Components of Evacuation Optimiser The EO consists of an external tool for simulating evacuation scenarios. When provided, data from installed counter-person sensors can be used. No automatic systems/languages are currently provided to manage the flow of information (i.e. simulation of scenarios and analysis are performed manually by operators). |
Social Media Detection
Components of Social Media Detection The SMD tool provides its functionalities “as-a-service". On premises installation is not available. |
Firearm Detector
Components of Firearm Detector The tool is continuously deployed to monitor and look out for weapons in surveillance camera feeds, without any operator intervention. |
IMPETUS Platform
Components of IMPETUS Platform The IMPETUS Platform centralises the outputs from the tools in a single database and to present them to the users. The data is collected using two methods:
The Platform also deals with the security aspects of communication with the tools and access to the data. The communication with the tools is done using an encrypted channel (using TLS). An authentication mechanism is implemented for tools and users access to the platform, followed by an authorization process – the tools are allowed to submit data only to certain topics from the message broker and the users are allowed to access the UI of the tools corresponding to their roles. The platform consists of a set of docker images that contain the functionalities of the platform. The most important are:
|