Innovating Works
HORIZON-CL3-2022-CS-01-01
HORIZON-CL3-2022-CS-01-01: Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:
Sólo fondo perdido 0 €
European
This call is closed Esta línea ya está cerrada por lo que no puedes aplicar.
An upcoming call for this aid is expected, the exact start date of call is not yet clear.
Presentation: Consortium Consortium: Esta ayuda está diseñada para aplicar a ella en formato consorcio.
Minimum number of participants.
This aid finances Proyectos:

ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:

Improved disruption preparedness and resilience of digital infrastructure in EuropeImproved capacity building in digital infrastructure security including organisational and operational capabilitiesRobust evidence used in cybersecurity decisions and toolsBetter prediction of cybersecurity threats and related risksImproved response capabilities based on effective collaboration and/or coordination with other relevant national or EU bodies in charge of Cybersecurity, including holistic incident reporting and enabling coordinated cyber-incident response. The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:Digital infrastructures together with their connected devices are characterised by complex interdependencies involving various physical and logical layers and connecting a wide range of legacy IT solutions and innovative technologies. Application scenarios include but are not limited to cybersecurity of communication systems and networks and their components, e.g. 5G networks, Internet of Things (I... see more

ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:

Improved disruption preparedness and resilience of digital infrastructure in EuropeImproved capacity building in digital infrastructure security including organisational and operational capabilitiesRobust evidence used in cybersecurity decisions and toolsBetter prediction of cybersecurity threats and related risksImproved response capabilities based on effective collaboration and/or coordination with other relevant national or EU bodies in charge of Cybersecurity, including holistic incident reporting and enabling coordinated cyber-incident response. The proposal should provide appropriate indicators to measure its progress and specific impact.


Scope:Digital infrastructures together with their connected devices are characterised by complex interdependencies involving various physical and logical layers and connecting a wide range of legacy IT solutions and innovative technologies. Application scenarios include but are not limited to cybersecurity of communication systems and networks and their components, e.g. 5G networks, Internet of Things (IoT) devices, medical devices, supervisory control and data acquisition (SCADA) systems, and their services, e.g. cloud-based ICT solutions. Their availability, controlled performance and reliability need to be guaranteed at every moment serving the needs, sometimes critical and safety-related e.g. in transportation, energy, healthcare, of millions of citizens, enterprises and society. Therefore, they need to be protected in real-time against ever-evolving cybersecurity threats.

Building on research and innovation in the area of cybersecurity of digital infrastructures for example projects funded from H2020 SU-DS01-2018[1], SU-DS04-2018-2020[2], SU-DS05-2018-2019[3] and SU-TDS-02-2018[4], state of the art technologies should support the logging, categorisation, data aggregation from different sources, automatic information extraction and analysis of cybersecurity incidents. This includes advanced methods for cyber threats intelligence and cyber-incident forensics enabling better prediction of cyber security threats. Proposals should develop and validate demonstration prototypes of tools and technologies to monitor and analyse cybersecurity incidents in an operational environment in line with the NIS directive and the General Data Protection Regulation. They should contribute to improved penetration testing methods and their automation by using machine learning and other AI technologies as appropriate. Moreover, proposals should support effective network traffic analysis applying detection techniques in network operations based on advanced security information management and threat intelligence. Proposed solutions should also include validation or piloting of cyber threat intelligence with early-stage detection, prediction and contributions towards response capability using predictive analytics, and as relevant, with efficient and user-friendly interaction methods, e.g. visual analytics. Furthermore, solutions deployed by this action should validate their approach to intrusion detection and incident monitoring with real end-users and their needs.

For expanding the proposed work in terms of additional pilot sites, additional user groups, additional applications, and complementary assessment of the acceptability of the use case, the actions may involve financial support to third parties in line with the conditions set out in Part B of the General Annexes. Each consortium will define the selection process of the third parties for which financial support will be granted (typically in the order of EUR 50 000 to 300 000 per party). Up to 20% of the EU funding requested by the proposal may be allocated to the purpose of financial support to third parties.

A strong culture awareness of data protection should be fostered. The proposals should also appropriately address concerns about mass surveillance and protection of personal spaces. All technologies and tools developed should be appropriately documented, to support take-up and replicability.

Consortia should bring together interdisciplinary expertise and capacity covering the supply and the demand side. Participation of SMEs is strongly encouraged. In this topic the integration of the gender dimension (sex and gender analysis) in research and innovation content is not a mandatory requirement.


Specific Topic Conditions:Activities are expected to achieve TRL 7 by the end of the project – see General Annex B.




Cross-cutting Priorities:Digital AgendaArtificial IntelligenceForesight


[1]Cybersecurity preparedness - cyber range, simulation and economics

[2]Cybersecurity in the Electrical Power and Energy System (EPES): an armour against cyber and privacy attacks and data breaches

[3]Digital security, privacy, data protection and accountability in critical sectors

[4]Toolkit for assessing and reducing cyber risks in hospitals and care centres to protect privacy/data/infrastructures

see less

Temáticas Obligatorias del proyecto: Temática principal: Incident analysis communication forecasting Foresight Digital Agenda Internet of Things embedded/pervasive systems Critical Infrastructure Protection (CIP) Cross-border/organizational incident coordination Artificial Intelligence Human perception of cybersecurity Artificial Intelligence & Decision support Intrusion detection and honeypots Incident Handling and Digital Forensics

Consortium characteristics

Scope European : The aid is European, you can apply to this line any company that is part of the European Community.
Tipo y tamaño de organizaciones: The necessary consortium design for the processing of this aid needs:

characteristics of the Proyecto

Requisitos de diseño: Duración:
Requisitos técnicos: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes:
Do you want examples? Puedes consultar aquí los últimos proyectos conocidos financiados por esta línea, sus tecnologías, sus presupuestos y sus compañías.
Financial Chapters: The chapters of financing expenses for this line are:
Personnel costs.
Expenses related to personnel working directly on the project are based on actual hours spent, based on company costs, and fixed ratios for certain employees, such as the company's owners.
Subcontracting costs.
Payments to external third parties to perform specific tasks that cannot be performed by the project beneficiaries.
Purchase costs.
They include the acquisition of equipment, amortization, material, licenses or other goods and services necessary for the execution of the project
Other cost categories.
Miscellaneous expenses such as financial costs, audit certificates or participation in events not covered by other categories
Indirect costs.
Overhead costs not directly assignable to the project (such as electricity, rent, or office space), calculated as a fixed 25% of eligible direct costs (excluding subcontracting).
Madurez tecnológica: The processing of this aid requires a minimum technological level in the project of TRL 6:. Se cuenta con prototipos piloto capaces de desarrollar todas las funciones necesarias dentro de un sistema determinado, habiendo superado pruebas de factibilidad en condiciones de operación o funcionamiento real. + info.
TRL esperado:

Characteristics of financing

Intensidad de la ayuda: Sólo fondo perdido + info
Lost Fund:
0% 25% 50% 75% 100%
For the eligible budget, the intensity of the aid in the form of a lost fund may reach From a 70% up to a 100%.
The funding rate for IA projects is 70 % for profit-making legal entities and 100 % for non-profit legal entities. The funding rate for IA projects is 70 % for profit-making legal entities and 100 % for non-profit legal entities.
Guarantees:
does not require guarantees
No existen condiciones financieras para el beneficiario.

Additional information about the call

incentive effect: Esta ayuda no tiene efecto incentivador. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
non -competitive competitive Very competitive
We do not know the total budget of the line
minimis: Esta línea de financiación NO considera una “ayuda de minimis”. You can consult the regulations here.

other advantages

SME seal: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.
HORIZON-CL3-2022-CS-01 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Improved disruption preparedness...
Sin info.
HORIZON-CL3-2022-CS-01-03 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
en consorcio:
Cerrada does 7 months | next call scheduled for the month of
HORIZON-CL3-2022-CS-01-04 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
en consorcio:
Cerrada does 7 months | next call scheduled for the month of
HORIZON-CL3-2022-CS-01-04 Transition towards Quantum-Resistant Cryptography
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Cerrada does 7 months | next call scheduled for the month of
HORIZON-CL3-2022-CS-01-03 Transition towards Quantum-Resistant Cryptography
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Measuring, assessing and standard...
Cerrada does 2 years | next call scheduled for the month of
HORIZON-CL3-2022-CS-01-01 Improved monitoring of threats, intrusion detection and response in complex and heterogeneous digital systems and infrastructures
en consorcio: ExpectedOutcome:Projects are expected to contribute to at least three of the following expected outcomes: Improved disruption preparedness...
Cerrada | next call scheduled for the month of