{"id":78730,"date":"2019-03-20T09:58:18","date_gmt":"2019-03-20T09:58:18","guid":{"rendered":"https:\/\/eurecat.org\/?post_type=avada_portfolio&#038;p=78730"},"modified":"2019-04-01T09:56:03","modified_gmt":"2019-04-01T09:56:03","slug":"otiot","status":"publish","type":"avada_portfolio","link":"https:\/\/eurecat.org\/en\/portfolio-items\/otiot\/","title":{"rendered":"OTIOT"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-first\" style=\"--awb-bg-size:cover;width:65.3333%; margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p><img decoding=\"async\" class=\"alignnone wp-image-78735 size-full\" src=\"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850.jpg\" alt=\"\" width=\"850\" height=\"447\" srcset=\"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850-200x105.jpg 200w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850-300x158.jpg 300w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850-400x210.jpg 400w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850-600x316.jpg 600w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850-768x404.jpg 768w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850-800x421.jpg 800w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850.jpg 850w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/><\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\"><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-2\"><p>OTIOT develops a system for monitoring and detecting threats in OT\/IoT environments (Operational Technology\/Internet of Things) that allows the automated detection of attack patterns and identification of compromised devices, as well as the possible automated recovery of filtered sensitive data.<\/p>\n<p>During the project, a system for deploying a network of OT and IoT device sensors will be studied and developed, as well as other systems for gathering information on threats. Likewise, technologies based on Big Data will be developed for the mass storage and processing of data and algorithms for the extraction of intelligence from the information between threat actors and cybercriminal groups.<\/p>\n<p>The OTIOT system, which will be validated at the Blueliv and Eurecat facilities, will allow the implementation of effective defensive strategies to overcome security challenges posed by the introduction of interconnected IoT and OT environments and will allow the expansion of the Blueliv product engine to process malware and malicious URLs.<\/p>\n<p>The project, led by <a href=\"https:\/\/www.blueliv.com\/\">Blueliv<\/a>, includes participation from Eurecat via <a href=\"https:\/\/eurecat.org\/en\/field-of-knowledge\/it-ot-security\/\">IT-Security Technology Unit<\/a>. Eurecat collaborates in the project in the application of systems based on artificial intelligence, as well as in the definition of new intelligence algorithms for the automation of security management, of vital need and importance against the risks inherent in present and the future OT\/IoT systems.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-last\" style=\"--awb-bg-size:cover;width:30.6666%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">General details<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-3\"><p><strong>Project<\/strong><\/p>\n<p>OTIOT \u2013 System for monitoring and detect threats in IoT and OT environments.<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:0px;margin-bottom:10px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e0dede;border-top-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-4\"><p><strong>Project reference<\/strong><\/p>\n<p>RTC-2017-6175-7<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:0px;margin-bottom:10px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e0dede;border-top-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-5\"><p><strong>Programme and call for tender<\/strong><\/p>\n<p>Project financed by the MINISTRY OF SCIENCE, INNOVATION AND UNIVERSITIES and by the European Union, within the framework of the call Retos-Collaboration of the State Program of Research, Development and Innovation Oriented to the Challenges of Society, within the State Research Plan Scientific and Technical and Innovation 2013-2016, with the main objective of promoting technological development, innovation and quality research.<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:0px;margin-bottom:10px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e0dede;border-top-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"300\" height=\"60\" title=\"LOGO_MCIU_Gob_Web_AEI_low\" src=\"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/LOGO_MCIU_Gob_Web_AEI_low-1-300x60.jpg\" alt class=\"img-responsive wp-image-79192\" srcset=\"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/LOGO_MCIU_Gob_Web_AEI_low-1-200x40.jpg 200w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/LOGO_MCIU_Gob_Web_AEI_low-1-400x80.jpg 400w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/LOGO_MCIU_Gob_Web_AEI_low-1-600x120.jpg 600w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/LOGO_MCIU_Gob_Web_AEI_low-1-800x160.jpg 800w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/LOGO_MCIU_Gob_Web_AEI_low-1.jpg 1000w\" sizes=\"(max-width: 800px) 100vw, 600px\" \/><\/span><\/div><\/div><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"150\" height=\"150\" alt=\"FEDER\" title=\"FEDER RETOS\" src=\"https:\/\/eurecat.org\/wp-content\/uploads\/2018\/10\/FEDER-RETOS-150x150.png\" class=\"img-responsive wp-image-72883\" srcset=\"https:\/\/eurecat.org\/wp-content\/uploads\/2018\/10\/FEDER-RETOS-66x66.png 66w, https:\/\/eurecat.org\/wp-content\/uploads\/2018\/10\/FEDER-RETOS-150x150.png 150w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/span><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":20,"featured_media":78738,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"portfolio_category":[1527,1442],"portfolio_skills":[1543,1547],"portfolio_tags":[],"class_list":["post-78730","avada_portfolio","type-avada_portfolio","status-publish","format-standard","has-post-thumbnail","hentry","portfolio_category-it-security-en","portfolio_category-national-projects","portfolio_skills-feder-en","portfolio_skills-retos-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OTIOT \u2013 Monitoring and detect threats in IoT and OT environments<\/title>\n<meta name=\"description\" content=\"OTIOT develops a system for monitoring and detecting threats in OT\/IoT environments that allows the automated detection of attack pattern ...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eurecat.org\/en\/portfolio-items\/otiot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OTIOT \u2013 Monitoring and detect threats in IoT and OT environments\" \/>\n<meta property=\"og:description\" content=\"OTIOT develops a system for monitoring and detecting threats in OT\/IoT environments that allows the automated detection of attack pattern ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eurecat.org\/en\/portfolio-items\/otiot\/\" \/>\n<meta property=\"og:site_name\" content=\"Eurecat\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-01T09:56:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_520.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"520\" \/>\n\t<meta property=\"og:image:height\" content=\"272\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/portfolio-items\\\/otiot\\\/\",\"url\":\"https:\\\/\\\/eurecat.org\\\/en\\\/portfolio-items\\\/otiot\\\/\",\"name\":\"OTIOT \u2013 Monitoring and detect threats in IoT and OT environments\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/portfolio-items\\\/otiot\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/portfolio-items\\\/otiot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/OTIOT_520.jpg\",\"datePublished\":\"2019-03-20T09:58:18+00:00\",\"dateModified\":\"2019-04-01T09:56:03+00:00\",\"description\":\"OTIOT develops a system for monitoring and detecting threats in OT\\\/IoT environments that allows the automated detection of attack pattern ...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/portfolio-items\\\/otiot\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eurecat.org\\\/en\\\/portfolio-items\\\/otiot\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/portfolio-items\\\/otiot\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/OTIOT_520.jpg\",\"contentUrl\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/OTIOT_520.jpg\",\"width\":520,\"height\":272},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/portfolio-items\\\/otiot\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inici\",\"item\":\"https:\\\/\\\/eurecat.org\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Portfolio\",\"item\":\"https:\\\/\\\/eurecat.org\\\/en\\\/portfolio-items\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"OTIOT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/eurecat.org\\\/en\\\/\",\"name\":\"Eurecat\",\"description\":\"Otro sitio realizado con WordPress\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eurecat.org\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OTIOT \u2013 Monitoring and detect threats in IoT and OT environments","description":"OTIOT develops a system for monitoring and detecting threats in OT\/IoT environments that allows the automated detection of attack pattern ...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eurecat.org\/en\/portfolio-items\/otiot\/","og_locale":"en_US","og_type":"article","og_title":"OTIOT \u2013 Monitoring and detect threats in IoT and OT environments","og_description":"OTIOT develops a system for monitoring and detecting threats in OT\/IoT environments that allows the automated detection of attack pattern ...","og_url":"https:\/\/eurecat.org\/en\/portfolio-items\/otiot\/","og_site_name":"Eurecat","article_modified_time":"2019-04-01T09:56:03+00:00","og_image":[{"width":520,"height":272,"url":"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_520.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/eurecat.org\/en\/portfolio-items\/otiot\/","url":"https:\/\/eurecat.org\/en\/portfolio-items\/otiot\/","name":"OTIOT \u2013 Monitoring and detect threats in IoT and OT environments","isPartOf":{"@id":"https:\/\/eurecat.org\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eurecat.org\/en\/portfolio-items\/otiot\/#primaryimage"},"image":{"@id":"https:\/\/eurecat.org\/en\/portfolio-items\/otiot\/#primaryimage"},"thumbnailUrl":"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_520.jpg","datePublished":"2019-03-20T09:58:18+00:00","dateModified":"2019-04-01T09:56:03+00:00","description":"OTIOT develops a system for monitoring and detecting threats in OT\/IoT environments that allows the automated detection of attack pattern ...","breadcrumb":{"@id":"https:\/\/eurecat.org\/en\/portfolio-items\/otiot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eurecat.org\/en\/portfolio-items\/otiot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eurecat.org\/en\/portfolio-items\/otiot\/#primaryimage","url":"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_520.jpg","contentUrl":"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_520.jpg","width":520,"height":272},{"@type":"BreadcrumbList","@id":"https:\/\/eurecat.org\/en\/portfolio-items\/otiot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inici","item":"https:\/\/eurecat.org\/en\/"},{"@type":"ListItem","position":2,"name":"Portfolio","item":"https:\/\/eurecat.org\/en\/portfolio-items\/"},{"@type":"ListItem","position":3,"name":"OTIOT"}]},{"@type":"WebSite","@id":"https:\/\/eurecat.org\/en\/#website","url":"https:\/\/eurecat.org\/en\/","name":"Eurecat","description":"Otro sitio realizado con WordPress","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eurecat.org\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/avada_portfolio\/78730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/avada_portfolio"}],"about":[{"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/types\/avada_portfolio"}],"author":[{"embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/comments?post=78730"}],"version-history":[{"count":0,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/avada_portfolio\/78730\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/media\/78738"}],"wp:attachment":[{"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/media?parent=78730"}],"wp:term":[{"taxonomy":"portfolio_category","embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/portfolio_category?post=78730"},{"taxonomy":"portfolio_skills","embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/portfolio_skills?post=78730"},{"taxonomy":"portfolio_tags","embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/portfolio_tags?post=78730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}