Tag Archives: cyberbattle

Automated Cyber-Security Systems: DARPA

data

From the DARPA website:

DARPA’s Cyber Grand Challenge takes aim at an increasingly serious problem: the inadequacy of current network security systems, which require expert programmers to identify and repair system weaknesses—typically after attackers have taken advantage of those weaknesses to steal data or disrupt processes. Such disruptions pose greater risks than ever as more and more devices, including vehicles and homes, get networked in what has become known as “the Internet of things.

“Today’s security methods involve experts working with computerized systems to identify attacks, craft corrective patches and signatures and distribute those correctives to users everywhere—a process that can take months from the time an attack is first launched,” said Mike Walker, DARPA program manager. “The only effective approach to defending against today’s ever-increasing volume and diversity of attacks is to shift to fully automated systems capable of discovering and neutralizing attacks instantly.”

To help accelerate this transition, DARPA launched the Cyber Grand Challenge, the first computer security tournament designed to test the wits of machines, not experts. The Challenge plans to follow a “capture the flag” competition format that experts have used for more than 20 years to test their cyber defense skills. That approach requires that competitors reverse engineer software created by challenge organizers and locate and heal its hidden weaknesses in a live network competition. The longest-running annual capture-the-flag challenge for experts is held at an annual conference known as DEF CON, and under the terms of a new agreement the Cyber Grand Challenge final competition is scheduled to co-locate with the DEF CON Conference in Las Vegas in 2016…

At the event, computers that have made it through a series of qualifying events over the next two years would compete head-to-head in a final tournament. Custom data visualization technology is under development to make it easy for spectators—both a live audience at the conference and anyone watching the event’s video stream worldwide—to follow the action.   Details about the Cyber Grand Challenge and some of the other registered teams can be found at www.cybergrandchallenge.com.

Plan X for Cyberbattle: DARPA

The Defense Advanced Research Projects Agency (DARPA) Information Innovation Office (I2O) will host a Proposers’ Day in support of the anticipated Broad Agency Announcement (BAA) for the Plan X program.  The Proposers’ Day Workshop will be held on 27 September at the DARPA Conference Center, 675 N. Randolph Street, Arlington, VA from 0900 to 1600 EDT. There will be an unclassified session in the morning and a classified SECRET session in the afternoon. Attendance at the afternoon session is limited to individuals with US DOD SECRET clearances or higher. Neither session is open to the general public or members of the media. It is anticipated that the Plan X BAA will be released by the end of September 2012.

PROGRAM OBJECTIVE AND DESCRIPTION

The objective of the Plan X program is to create revolutionary technologies for understanding, planning, and managing cyberwarfare in real-time, large-scale, and dynamic network environments. Plan X will also conduct novel research into the nature of cyberwarfare and support development of fundamental strategies and tactics needed to dominate the cyber battlespace. The Plan X program is explicitly not funding research and development efforts in vulnerability analysis or cyberweapon generation.

DARPA seeks innovative research in four key areas in support of Plan X:

• Understanding the cyber battlespace: This area focuses on developing automated analysis techniques to assist human operators in planning cyber operations. Specifically, analyzing large-scale logical network topology characteristics of nodes (i.e., edge count, dynamic vs. static links, usage) and edges (i.e. latency, bandwidth, periodicity).

• Automatically constructing verifiable and quantifiable cyber operations: This area focuses on developing high-level mission plans and automatically synthesizing a mission script that is executed through a human-on-the-loop interface, similar to the auto-pilot function in modern aircraft. This process will leverage formal methods to provably quantify the potential battle damage from each synthesized mission plan.

• Developing operating systems and platforms designed to operate in dynamic, contested, and hostile network environments: This area focuses on building hardened “battle units” that can perform cyberwarfare functions such as battle damage monitoring, communication relay, weapon deployment, and adaptive defense.

• Visualizing and interacting with large-scale cyber battlespaces: This area focuses on developing intuitive views and overall user experience. Coordinated views of the cyber battlespace will provide cyberwarfare functions of planning, operation, situational awareness, and war gaming.

A system architecture team is also sought to lead the end-to-end Plan X system development. This will include working with Plan X performers to develop the standard system application programming interfaces, data format specifications, and performer integration schedule. The system architecture team will also be responsible for purchasing Plan X system infrastructure and hardware.  The Plan X program is structured around an on-site DARPA cyberwar laboratory where performers will continuously integrate developing technologies into the end-to-end Plan X system.

Excerpt from: Special Notice Plan X Proposers’ Day Workshop, DARPA-SN-12-51, August 17, 2012

Foundational Cyberwarfare (Plan X)

Proposers’ Day Workshop, 27 September 2012