CAPTORProject ID: 651669
Financiado con arreglo a:
H2020-EU.3.7. - Secure societies - Protecting freedom and security of Europe and its citizens
cAPTor captures Advanced System Threats
Detalles del proyecto
Coste total:EUR 71 429
Aportación de la UE:EUR 50 000
Tema(s):DRS-17-2014-1 - Critical infrastructure protection topic 7: SME instrument topic: “Protection of Urban soft targets and urban critical infrastructures”
Convocatoria de propuestas:H2020-SMEINST-1-2014See other projects for this call
Régimen de financiación:SME-1 - SME instrument phase 1
CAPTOR is a set of tools whose main objective is to characterize, identify and detect APT’s as well as minimize their impact in the target organization. CAPTOR should be able to operate in complex environments, like Urban Critical Infrastructures, where IT, industrial, energy and network infrastructures must be protected from security threats.
The most important innovation of CAPTOR is the application of a set of techniques and methodologies known as anomaly detection, which will be later explained and an approach more akin to classic intelligence as opposed to the malware-detection-centered approach used by the vast majority of proposed commercial solutions.
S2’ s objective is to position CAPTOR as a leading European toolset to protect Critical Infrastructures in general and Urban Soft Targets and Critical Infrastructures in particular.
Advances in the integration of ICT technologies in urban areas and their infrastructures have brought undeniable advantages to the cities economic management, inhabitability and have helped to reduce their environmental impact.
Unfortunately, together with these advantages, many cyber security vulnerabilities have been introduced in infrastructures where these threats have never before been taken into account. The threat posed by cyber terrorists and cyber criminals continually grows and organizations are increasing their awareness of the possibility of an incident.
An APT (Advanced Persistent Threat) is a planned multimodal attack targeted at a specific organization or infrastructure, where several types of malware, under control of a command center is combined with techniques like social engineering, use of insiders or access through third parties, with the objective of gaining access to critical physical or virtual assets and, exfiltrate information, obtain economic advantage or sabotage infrastructures. APTs are the most important kind of cyber attacks a critical infrastructure can suffer today.
Aportación de la UE: EUR 50 000
CALLE RAMIRO DE MAEZTU 7 bajo