{"id":5931,"date":"2024-02-14T13:27:45","date_gmt":"2024-02-14T12:27:45","guid":{"rendered":"https:\/\/rcai.de\/?p=5931"},"modified":"2026-01-08T13:04:55","modified_gmt":"2026-01-08T12:04:55","slug":"kritis3m","status":"publish","type":"post","link":"https:\/\/rcai.de\/en\/2024\/02\/14\/kritis3m\/","title":{"rendered":"KRITIS\u00b3M"},"content":{"rendered":"<h2 class=\"wp-block-heading alignwide has-dm-sans-font-family\" style=\"text-transform:none\">KRITIS\u00b3M<\/h2>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-78f78ab7 wp-block-columns-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"--col-width:40%;font-style:normal;font-weight:400;flex-basis:40%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/rcai.de\/wp-content\/uploads\/2024\/02\/oth_rcai_artificial_intelligence_attack_intrusion_detection_it__30eb11d4-b937-488a-9024-c163e1f9cd28.png\" alt=\"\" class=\"wp-image-5937\" srcset=\"https:\/\/rcai.de\/wp-content\/uploads\/2024\/02\/oth_rcai_artificial_intelligence_attack_intrusion_detection_it__30eb11d4-b937-488a-9024-c163e1f9cd28.png 1024w, https:\/\/rcai.de\/wp-content\/uploads\/2024\/02\/oth_rcai_artificial_intelligence_attack_intrusion_detection_it__30eb11d4-b937-488a-9024-c163e1f9cd28-300x300.png 300w, https:\/\/rcai.de\/wp-content\/uploads\/2024\/02\/oth_rcai_artificial_intelligence_attack_intrusion_detection_it__30eb11d4-b937-488a-9024-c163e1f9cd28-150x150.png 150w, https:\/\/rcai.de\/wp-content\/uploads\/2024\/02\/oth_rcai_artificial_intelligence_attack_intrusion_detection_it__30eb11d4-b937-488a-9024-c163e1f9cd28-768x768.png 768w, https:\/\/rcai.de\/wp-content\/uploads\/2024\/02\/oth_rcai_artificial_intelligence_attack_intrusion_detection_it__30eb11d4-b937-488a-9024-c163e1f9cd28-12x12.png 12w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Symbol image (Midjourney, Generative AI)<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"font-style:normal;font-weight:400\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"938\" height=\"384\" src=\"https:\/\/rcai.de\/wp-content\/uploads\/2024\/02\/KRITIS3M_Logo.png\" alt=\"\" class=\"wp-image-5899\" style=\"width:226px;height:auto\" srcset=\"https:\/\/rcai.de\/wp-content\/uploads\/2024\/02\/KRITIS3M_Logo.png 938w, https:\/\/rcai.de\/wp-content\/uploads\/2024\/02\/KRITIS3M_Logo-300x123.png 300w, https:\/\/rcai.de\/wp-content\/uploads\/2024\/02\/KRITIS3M_Logo-768x314.png 768w, https:\/\/rcai.de\/wp-content\/uploads\/2024\/02\/KRITIS3M_Logo-18x7.png 18w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/figure>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-dm-sans-font-family has-large-font-size\" style=\"font-style:normal;font-weight:400;text-transform:none\">KRITIS Scalable Safe and Secure Modules<\/h4>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading alignwide tw-mt-0 tw-link-hover-underline has-dm-sans-font-family has-medium-font-size\" style=\"text-transform:none\">funded by: <br><a href=\"https:\/\/www.bmwk.de\">Federal Ministry of Economics and Climate Protection (BMWK)<\/a><br><\/h6>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading alignwide tw-mt-0 tw-link-hover-underline has-dm-sans-font-family has-medium-font-size\" style=\"text-transform:none\">Project responsible: <a href=\"https:\/\/rcai.de\/en\/labs\/las3\/\" data-type=\"page\" data-id=\"3618\">Prof. Dr. J\u00fcrgen Mottok<\/a><\/h6>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading alignwide tw-mt-0 tw-link-hover-underline has-dm-sans-font-family has-medium-font-size\" style=\"text-transform:none\">Cooperation partners: <a href=\"https:\/\/www.amprion.net\">Amprion GmbH<\/a>, <a href=\"https:\/\/atos.net\">Atos SE<\/a>, <a href=\"https:\/\/www.canway.de\">Canway<\/a>, <a href=\"https:\/\/www.flowchief.de\">FlowChief GmbH<\/a>, <a href=\"https:\/\/www.gai-netconsult.de\">GAI NetConsult GmbH<\/a>, <a href=\"https:\/\/www.hensoldt.net\/\">Hensoldt AG<\/a>, <a href=\"https:\/\/www.innio.com\">INNIO Jenbacher GmbH &amp; Co OG<\/a>, Wolfgang Killmann, <a href=\"https:\/\/www.reinhausen.com\">Maschinenfabrik Reinhausen GmbH<\/a>, <a href=\"https:\/\/www.microsys.de\">MicroSys Electronics GmbH<\/a>, <a href=\"https:\/\/www.phoenixcontact.com\">Phoenix Contact<\/a>, <a href=\"https:\/\/www.rohde-schwarz.com\">Rohde &amp; Schwarz GmbH &amp; Co. KG<\/a>, <a href=\"https:\/\/www.zitis.bund.de\">ZITiS<\/a>, <a href=\"https:\/\/www.zv-laber-naab.de\/content\/startseite\/index.php\">Zweckverband der Wasserversorgungsgruppe Laber-Naab<\/a><\/h6>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading alignwide tw-mt-0 tw-link-hover-underline has-dm-sans-font-family has-medium-font-size\" style=\"text-transform:none\">Duration: 2023-2025<\/h6>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignwide has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h4 class=\"wp-block-heading alignwide has-dm-sans-font-family has-large-font-size\" style=\"font-style:normal;font-weight:500;text-transform:none\">Scalable, AI-Based Intrusion Detection<\/h4>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading alignwide tw-mt-0 tw-link-hover-underline has-dm-sans-font-family has-medium-font-size\" style=\"text-transform:none\">Das Forschungsprojekt KRITIS\u00b3M besch\u00e4ftigt sich mit der Verbesserung der Cybersecurity von kritischen Infrastrukturen und mit der Steigerung der Langlebigkeit von kryptografischen Sicherheitsl\u00f6sungen in industriellen Anlagen. Hierbei wird neben der agilen Kryptografie auch der Einsatz von K\u00fcnstlicher Intelligenz zur Angriffserkennung erforscht. Ziel ist es, ein System zu entwickeln, welches Bedrohungen cyber-physikalischer Systeme erkennt und bei auftretenden Angriffen oder Schwachstellen fr\u00fchzeitig warnen kann. Um dieses Ziel zu erreichen, wird in KRITIS\u00b3M K\u00fcnstliche Intelligenz in drei Themengebieten erforscht:<\/h6>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading alignwide\" style=\"font-size:clamp(0.984rem, 0.984rem + ((1vw - 0.2rem) * 0.938), 1.5rem);\">Automated Penetration Testing<\/h2>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading alignwide tw-mt-0 tw-link-hover-underline has-dm-sans-font-family has-medium-font-size\" style=\"text-transform:none\">Realistic cyber attacks are planned and executed automatically using AI to generate training data and validate developed systems. As part of the project, an independent test system is being developed for this purpose, on which isolated industrial communication is generated using a hybrid approach.<\/h6>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading alignwide\" style=\"font-size:clamp(0.984rem, 0.984rem + ((1vw - 0.2rem) * 0.938), 1.5rem);\">Network Intrusion Detection<\/h2>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading alignwide tw-mt-0 tw-link-hover-underline has-dm-sans-font-family has-medium-font-size\" style=\"text-transform:none\">AI models and their training are being researched to recognise attacks (intrusion detection) based on conspicuous network traffic in the industrial sector . As part of the overall project, models and concepts that are suitable for use in the industrial sector are investigated.<\/h6>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading alignwide\" style=\"font-size:clamp(0.984rem, 0.984rem + ((1vw - 0.2rem) * 0.938), 1.5rem);\">Anomaly Detection Based on Timing Metrics<\/h2>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading alignwide tw-mt-0 tw-link-hover-underline has-dm-sans-font-family has-medium-font-size\" style=\"text-transform:none\">Dar\u00fcber hinaus wird an Algorithmen und Methoden gearbeitet, welche anomales Verhalten von Embedded-Systemen klassifizieren k\u00f6nnen, das auf bestimmte Bedrohungen wie Zero-Day-Schwachstellen oder eine Manipulation der Systemkonfiguration hindeuten k\u00f6nnte.<\/h6>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Increasing the cybersecurity of critical infrastructures through AI<\/p>","protected":false},"author":8,"featured_media":5937,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[47,68],"tags":[],"class_list":["post-5931","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-projects-finished","category-las3"],"_links":{"self":[{"href":"https:\/\/rcai.de\/en\/wp-json\/wp\/v2\/posts\/5931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rcai.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rcai.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rcai.de\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/rcai.de\/en\/wp-json\/wp\/v2\/comments?post=5931"}],"version-history":[{"count":27,"href":"https:\/\/rcai.de\/en\/wp-json\/wp\/v2\/posts\/5931\/revisions"}],"predecessor-version":[{"id":6090,"href":"https:\/\/rcai.de\/en\/wp-json\/wp\/v2\/posts\/5931\/revisions\/6090"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rcai.de\/en\/wp-json\/wp\/v2\/media\/5937"}],"wp:attachment":[{"href":"https:\/\/rcai.de\/en\/wp-json\/wp\/v2\/media?parent=5931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rcai.de\/en\/wp-json\/wp\/v2\/categories?post=5931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rcai.de\/en\/wp-json\/wp\/v2\/tags?post=5931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}