SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection System up-to-date

Nabil Bouzerna
Nabil BouzernaChief Technology Officer at Arkangel, Paris-Saclay

Co-designed with FPC Ingénierie, SODA-IIoT4Factory offers a secure way to update CyPRES rule engines & cyber security/attack models. CyPRES is an intelligent IDS that strengthens industrial information systems. It learns then verifies the operation and behaviour of the system to the lowest level of detail. It detects the first signs of attacks before damage is incurred.

11
ANTICIPATE
DANGER
IMPROVE
SECURITY
OT/IT
EMPOWERNESS
PRESERVE
PROCESS
DETECT ATTACK
Future@SystemX 2017- Digital Days@Nano-INNOV – Paris Saclay
SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection System up-to-date
Contact : nabil.bouzerna@irt-systemx.fr
The SODA-IIoT4Factory demonstrator is built on top of the CHESS platform
(Cybersecurity Hardening Environment for Systems of Systems), an experimental and
technical cybersecurity platform funded by ANSSI to support cybersecurity research effort
at Institute for Technological Research SystemX - Paris-Saclay (EIC R&D project).
This platform is part of French Government “Nouvelle France Industrielle”, Cybersecurity
plan, action 8: set up one or more testing and demonstration cybersecurity platforms.
Secured On-the-pouce Decentralized Architecture for the Industrial Internet of Things (SODA-IIoT), co-designed by
IRT SystemX, CEA Tech List and Airbus Innovation Group, features innovative solutions to manage IIoT access rights
management & secure software and firmware updates through Blockchain technology & cryptographic signatures.
Analyse logged data to identify the root
cause of an anomaly or an attack and
implement appropriate security measures.
CyPRES is an intelligent IDS that strengthens industrial information systems. It learns then verifies the operation and
behaviour of the system to the lowest level of detail. It detects the first signs of attacks before damage is incurred.
Alert immediately of any intrusion or cyber
attack and intervene in order to ensure
continuity of service of the facilities.
Listen to all communications that pass through
the ICS without disrupting the control system.
CyPRES is a non-intrusive solution.
Ensure OT/IT empowerness by raising alerts to a
SIEM for a SOC exploitation.
Avoid production downtime or the deterioration of facilities by
monitoring the activity of the industrial network and anticipating
the risks associated with abnormal behaviour.
Co-designed with FPC Ingénierie, SODA-IIoT4Factory offers a secure way to update CyPRES rule engines
& cyber security/attack models.
• Discover, monitor and map de network and its equipment
• Detect unknown threats through continuous behaviour analysis
• Monitor the functional activity of the process
• Find the origin of an attack by a post-incident analysis
Frédéric Planchon, Fernand Costa, Vincent Nicaise and Nabil Bouzerna
Credit Jack Fazakerley

Recommended

SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date by
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-dateSODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-date
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-dateNabil Bouzerna
590 views1 slide
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c... by
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...
SODA-IIoT4RailTransport: Application to Railway Signalling System to ensure c...Nabil Bouzerna
123 views1 slide
Towards Better Availability and Accountability for IoT Updates by means of a ... by
Towards Better Availability and Accountability for IoT Updates by means of a ...Towards Better Availability and Accountability for IoT Updates by means of a ...
Towards Better Availability and Accountability for IoT Updates by means of a ...Nabil Bouzerna
258 views1 slide
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac... by
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...Nabil Bouzerna
172 views1 slide
WeatherXM at IoT Boussias Conference 2015 by
WeatherXM at IoT Boussias Conference 2015WeatherXM at IoT Boussias Conference 2015
WeatherXM at IoT Boussias Conference 2015Manolis Nikiforakis
956 views23 slides
Libelium IoT Conference 2018 - Air quality and noise monitoring for Airports 3.0 by
Libelium IoT Conference 2018 - Air quality and noise monitoring for Airports 3.0Libelium IoT Conference 2018 - Air quality and noise monitoring for Airports 3.0
Libelium IoT Conference 2018 - Air quality and noise monitoring for Airports 3.0Manolis Nikiforakis
435 views27 slides

More Related Content

What's hot

InnovationSummit2015 - iot connectivity by
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityThibault Cantegrel
1.2K views16 slides
Innovation Summit 2015 - 11 - morpho by
Innovation Summit 2015 - 11 - morphoInnovation Summit 2015 - 11 - morpho
Innovation Summit 2015 - 11 - morphoThibault Cantegrel
613 views9 slides
The cellular network: a vital link in the world of drones by
The cellular network: a vital link in the world of dronesThe cellular network: a vital link in the world of drones
The cellular network: a vital link in the world of dronesAGILE IoT
789 views23 slides
Innovation Summit 2015 - 10 - linear dust by
Innovation Summit 2015 - 10 - linear dustInnovation Summit 2015 - 10 - linear dust
Innovation Summit 2015 - 10 - linear dustThibault Cantegrel
759 views8 slides
City Infrastructure Cybersecurity by
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure CybersecurityLogitek Solutions
919 views8 slides
Smart buildings by
Smart buildingsSmart buildings
Smart buildingsDaleen van Wyk
339 views10 slides

What's hot(20)

The cellular network: a vital link in the world of drones by AGILE IoT
The cellular network: a vital link in the world of dronesThe cellular network: a vital link in the world of drones
The cellular network: a vital link in the world of drones
AGILE IoT789 views
Industrial Pioneers Days - Machine Learning by VEDLIoT Project
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine Learning
VEDLIoT Project112 views
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ... by ARCFIRE ICT
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
ARCFIRE ICT1.1K views
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC by FIWARE Mexico
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTECFIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC
FIWARE MEXICO WorkShop 2016 - 7. Example of FIWARE Applications by INFOTEC
FIWARE Mexico223 views
11th International Conference on Networks & Communications (NeCoM 2019) by IJNSA Journal
11th International Conference on Networks & Communications (NeCoM 2019)11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)
IJNSA Journal49 views
11th International Conference on Networks & Communications (NeCoM 2019) by ijwmn
11th International Conference on Networks & Communications (NeCoM 2019)11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)
ijwmn9 views
11th International Conference on Networks & Communications (NeCoM 2019) by ijwmn
11th International Conference on Networks & Communications (NeCoM 2019)11th International Conference on Networks & Communications (NeCoM 2019)
11th International Conference on Networks & Communications (NeCoM 2019)
ijwmn9 views
FIWARE Global Summit - BIIOT: Blockchain In Internet of Things by FIWARE
FIWARE Global Summit - BIIOT: Blockchain In Internet of ThingsFIWARE Global Summit - BIIOT: Blockchain In Internet of Things
FIWARE Global Summit - BIIOT: Blockchain In Internet of Things
FIWARE226 views
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce... by Nexgen Technology
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Nexgen Technology 116 views
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital... by Agence du Numérique (AdN)
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...
Applying IoT to the Management of Natural Disasters Risk NIAGRISK - A digital...
Internet of (weather) things on a grassroot LoRaWAN network by Manolis Nikiforakis
Internet of (weather) things on a grassroot LoRaWAN networkInternet of (weather) things on a grassroot LoRaWAN network
Internet of (weather) things on a grassroot LoRaWAN network
Manolis Nikiforakis2.4K views

Similar to SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection System up-to-date

IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020) by
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
759 views149 slides
Conférence ENGIE ACSS 2018 by
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 African Cyber Security Summit
491 views22 slides
How stuxnet spreads – a study of infection paths in best practice systems by
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsYury Chemerkin
23.5K views26 slides
Nozomi Fortinet Accelerate18 by
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
1.1K views21 slides
Transforming Smart Building Cybersecurity Strategy for the Age of IoT by
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTForescout Technologies Inc
1.5K views24 slides
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using... by
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEEMEMTECHSTUDENTPROJECTS
419 views5 slides

Similar to SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection System up-to-date(20)

IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020) by mike parks
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
mike parks759 views
How stuxnet spreads – a study of infection paths in best practice systems by Yury Chemerkin
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systems
Yury Chemerkin23.5K views
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using... by IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
Anti evasion and evader - klaus majewski by Stonesoft
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
Stonesoft1.8K views
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab... by Shakeel Ali
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Shakeel Ali119 views
Ot ics cyberattaques dans les organisations industrielles by Cisco Canada
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
Cisco Canada347 views
Sb securing-industrial-control-systems-with-fortinet by Ivan Carmona
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
Ivan Carmona240 views
Augmentation of a SCADA based firewall against foreign hacking devices by IJECEIAES
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
IJECEIAES24 views
2014_EMTieghi_Industrial_Security-templateSERVI by Enzo M. Tieghi
2014_EMTieghi_Industrial_Security-templateSERVI2014_EMTieghi_Industrial_Security-templateSERVI
2014_EMTieghi_Industrial_Security-templateSERVI
Enzo M. Tieghi340 views
Detect Network Threat Using SNORT Intrusion Detection System by IRJET Journal
Detect Network Threat Using SNORT Intrusion Detection SystemDetect Network Threat Using SNORT Intrusion Detection System
Detect Network Threat Using SNORT Intrusion Detection System
IRJET Journal2 views
Engineering Internship Report - Network Intrusion Detection And Prevention Us... by Disha Bedi
Engineering Internship Report - Network Intrusion Detection And Prevention Us...Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Engineering Internship Report - Network Intrusion Detection And Prevention Us...
Disha Bedi1.8K views
Gartner technologies for Infosec 2014-2015 by Samuel Kamuli
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
Samuel Kamuli4.8K views
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR... by IJCNCJournal
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
IJCNCJournal56 views

More from Nabil Bouzerna

Nabil bouzerna - Mémoire d'ingénieur / Master Thesis ENSIIE - ADVESTIGO - 2007 by
Nabil bouzerna - Mémoire d'ingénieur / Master Thesis ENSIIE - ADVESTIGO - 2007  Nabil bouzerna - Mémoire d'ingénieur / Master Thesis ENSIIE - ADVESTIGO - 2007
Nabil bouzerna - Mémoire d'ingénieur / Master Thesis ENSIIE - ADVESTIGO - 2007 Nabil Bouzerna
1.3K views94 slides
Bitcoin: A Peer-to-Peer Electronic Cash System (traduction fr) by
Bitcoin: A Peer-to-Peer Electronic Cash System (traduction fr)Bitcoin: A Peer-to-Peer Electronic Cash System (traduction fr)
Bitcoin: A Peer-to-Peer Electronic Cash System (traduction fr)Nabil Bouzerna
832 views10 slides
Sur les fondations de la trumpologique by
Sur les fondations de la trumpologiqueSur les fondations de la trumpologique
Sur les fondations de la trumpologiqueNabil Bouzerna
163 views4 slides
RAFFUT ANR by
RAFFUT ANRRAFFUT ANR
RAFFUT ANRNabil Bouzerna
82 views2 slides
La plateforme CHESS un outil pour l’analyse comparative des technologies de c... by
La plateforme CHESS un outil pour l’analyse comparative des technologies de c...La plateforme CHESS un outil pour l’analyse comparative des technologies de c...
La plateforme CHESS un outil pour l’analyse comparative des technologies de c...Nabil Bouzerna
985 views117 slides
Audition France Stratégie du 9 mars 2017 "Blockchain : les cas d'usage à l'ép... by
Audition France Stratégie du 9 mars 2017 "Blockchain : les cas d'usage à l'ép...Audition France Stratégie du 9 mars 2017 "Blockchain : les cas d'usage à l'ép...
Audition France Stratégie du 9 mars 2017 "Blockchain : les cas d'usage à l'ép...Nabil Bouzerna
452 views80 slides

More from Nabil Bouzerna(12)

Nabil bouzerna - Mémoire d'ingénieur / Master Thesis ENSIIE - ADVESTIGO - 2007 by Nabil Bouzerna
Nabil bouzerna - Mémoire d'ingénieur / Master Thesis ENSIIE - ADVESTIGO - 2007  Nabil bouzerna - Mémoire d'ingénieur / Master Thesis ENSIIE - ADVESTIGO - 2007
Nabil bouzerna - Mémoire d'ingénieur / Master Thesis ENSIIE - ADVESTIGO - 2007
Nabil Bouzerna1.3K views
Bitcoin: A Peer-to-Peer Electronic Cash System (traduction fr) by Nabil Bouzerna
Bitcoin: A Peer-to-Peer Electronic Cash System (traduction fr)Bitcoin: A Peer-to-Peer Electronic Cash System (traduction fr)
Bitcoin: A Peer-to-Peer Electronic Cash System (traduction fr)
Nabil Bouzerna832 views
Sur les fondations de la trumpologique by Nabil Bouzerna
Sur les fondations de la trumpologiqueSur les fondations de la trumpologique
Sur les fondations de la trumpologique
Nabil Bouzerna163 views
La plateforme CHESS un outil pour l’analyse comparative des technologies de c... by Nabil Bouzerna
La plateforme CHESS un outil pour l’analyse comparative des technologies de c...La plateforme CHESS un outil pour l’analyse comparative des technologies de c...
La plateforme CHESS un outil pour l’analyse comparative des technologies de c...
Nabil Bouzerna985 views
Audition France Stratégie du 9 mars 2017 "Blockchain : les cas d'usage à l'ép... by Nabil Bouzerna
Audition France Stratégie du 9 mars 2017 "Blockchain : les cas d'usage à l'ép...Audition France Stratégie du 9 mars 2017 "Blockchain : les cas d'usage à l'ép...
Audition France Stratégie du 9 mars 2017 "Blockchain : les cas d'usage à l'ép...
Nabil Bouzerna452 views
Expocrise - L’exploitation des médias sociaux avant, pendant et après la cris... by Nabil Bouzerna
Expocrise - L’exploitation des médias sociaux avant, pendant et après la cris...Expocrise - L’exploitation des médias sociaux avant, pendant et après la cris...
Expocrise - L’exploitation des médias sociaux avant, pendant et après la cris...
Nabil Bouzerna124 views
Quaero - L’innovation collaborative by Nabil Bouzerna
Quaero - L’innovation collaborative Quaero - L’innovation collaborative
Quaero - L’innovation collaborative
Nabil Bouzerna538 views
Quaero a research and innovation program addressing automatic processing of m... by Nabil Bouzerna
Quaero a research and innovation program addressing automatic processing of m...Quaero a research and innovation program addressing automatic processing of m...
Quaero a research and innovation program addressing automatic processing of m...
Nabil Bouzerna365 views
Future@SystemX - Nabil Bouzerna - Experiment IMM Project by Nabil Bouzerna
Future@SystemX - Nabil Bouzerna - Experiment IMM ProjectFuture@SystemX - Nabil Bouzerna - Experiment IMM Project
Future@SystemX - Nabil Bouzerna - Experiment IMM Project
Nabil Bouzerna2K views
ESILV Nabil Bouzerna Architecture de systèmes de traitement de l'information ... by Nabil Bouzerna
ESILV Nabil Bouzerna Architecture de systèmes de traitement de l'information ...ESILV Nabil Bouzerna Architecture de systèmes de traitement de l'information ...
ESILV Nabil Bouzerna Architecture de systèmes de traitement de l'information ...
Nabil Bouzerna1.6K views

Recently uploaded

Helko van den Brom - VSL by
Helko van den Brom - VSLHelko van den Brom - VSL
Helko van den Brom - VSLDutch Power
116 views18 slides
PPS.pptx by
PPS.pptxPPS.pptx
PPS.pptxmdabzayub
5 views51 slides
Yin Sun - Shell by
Yin Sun - ShellYin Sun - Shell
Yin Sun - ShellDutch Power
107 views17 slides
falsettos by
falsettosfalsettos
falsettosRenzoCalandra
13 views48 slides
Timeahead Agency Pitch Deck.pdf by
Timeahead Agency Pitch Deck.pdfTimeahead Agency Pitch Deck.pdf
Timeahead Agency Pitch Deck.pdfHabib-ur- Rehman
20 views13 slides
EADR DRDO by
EADR DRDOEADR DRDO
EADR DRDOAdityaThakre13
8 views39 slides

Recently uploaded(20)

Helko van den Brom - VSL by Dutch Power
Helko van den Brom - VSLHelko van den Brom - VSL
Helko van den Brom - VSL
Dutch Power116 views
Gym Members Community.pptx by nasserbf1987
Gym Members Community.pptxGym Members Community.pptx
Gym Members Community.pptx
nasserbf198710 views
ERGONOMIC RISK ASSESSMENT (ERA).pptx by j967z4hcnp
ERGONOMIC RISK ASSESSMENT (ERA).pptxERGONOMIC RISK ASSESSMENT (ERA).pptx
ERGONOMIC RISK ASSESSMENT (ERA).pptx
j967z4hcnp6 views
231121 SP slides - PAS workshop November 2023.pdf by PAS_Team
231121 SP slides - PAS workshop November 2023.pdf231121 SP slides - PAS workshop November 2023.pdf
231121 SP slides - PAS workshop November 2023.pdf
PAS_Team211 views
Roozbeh Torkzadeh - TU Eindhoven by Dutch Power
Roozbeh Torkzadeh - TU EindhovenRoozbeh Torkzadeh - TU Eindhoven
Roozbeh Torkzadeh - TU Eindhoven
Dutch Power108 views
Christan van Dorst - Hyteps by Dutch Power
Christan van Dorst - HytepsChristan van Dorst - Hyteps
Christan van Dorst - Hyteps
Dutch Power114 views

SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection System up-to-date

  • 1. 11 ANTICIPATE DANGER IMPROVE SECURITY OT/IT EMPOWERNESS PRESERVE PROCESS DETECT ATTACK Future@SystemX 2017- Digital Days@Nano-INNOV – Paris Saclay SODA-IIoT4Factory: Blockchain to keep the A.I. of your Intrusion Detection System up-to-date Contact : nabil.bouzerna@irt-systemx.fr The SODA-IIoT4Factory demonstrator is built on top of the CHESS platform (Cybersecurity Hardening Environment for Systems of Systems), an experimental and technical cybersecurity platform funded by ANSSI to support cybersecurity research effort at Institute for Technological Research SystemX - Paris-Saclay (EIC R&D project). This platform is part of French Government “Nouvelle France Industrielle”, Cybersecurity plan, action 8: set up one or more testing and demonstration cybersecurity platforms. Secured On-the-pouce Decentralized Architecture for the Industrial Internet of Things (SODA-IIoT), co-designed by IRT SystemX, CEA Tech List and Airbus Innovation Group, features innovative solutions to manage IIoT access rights management & secure software and firmware updates through Blockchain technology & cryptographic signatures. Analyse logged data to identify the root cause of an anomaly or an attack and implement appropriate security measures. CyPRES is an intelligent IDS that strengthens industrial information systems. It learns then verifies the operation and behaviour of the system to the lowest level of detail. It detects the first signs of attacks before damage is incurred. Alert immediately of any intrusion or cyber attack and intervene in order to ensure continuity of service of the facilities. Listen to all communications that pass through the ICS without disrupting the control system. CyPRES is a non-intrusive solution. Ensure OT/IT empowerness by raising alerts to a SIEM for a SOC exploitation. Avoid production downtime or the deterioration of facilities by monitoring the activity of the industrial network and anticipating the risks associated with abnormal behaviour. Co-designed with FPC Ingénierie, SODA-IIoT4Factory offers a secure way to update CyPRES rule engines & cyber security/attack models. • Discover, monitor and map de network and its equipment • Detect unknown threats through continuous behaviour analysis • Monitor the functional activity of the process • Find the origin of an attack by a post-incident analysis Frédéric Planchon, Fernand Costa, Vincent Nicaise and Nabil Bouzerna Credit Jack Fazakerley