Back to news

September 12, 2018 | International, C4ISR

DARPA Wants to Find Botnets Before They Attack

By Jack Corrigan

The defense agency awarded a contract to develop a tool that scours the internet for dormant online armies.

The military's research branch is investing in systems that automatically locate and dismantle botnets before hackers use them to cripple websites, companies or even entire countries.

The Defense Advanced Research Projects Agency on Aug. 30 awarded a $1.2 million contract to cybersecurity firm Packet Forensics to develop novel ways to locate and identify these hidden online armies. The award comes as part of the agency's Harnessing Autonomy for Countering Cyber-adversary Systems program, a DARPA spokesperson told Nextgov.

To build botnets, hackers infect internet-connected devices with malware that allows them to execute orders from a remote server. Because the virus sits dormant most of the time, the owners of infected devices rarely know their computer, smartphone or toaster has been compromised.

Through the HACCS program, DARPA aims to build a system that can automatically pinpoint botnet-infected devices and disable their malware without their owners ever knowing.

Launched in 2017, the program is investing in three main technologies: systems that uncover and fingerprint botnets across the internet, tools that upload software to infected devices through known security gaps, and software that disables botnet malware once it's uploaded. Packet Forensics' technology falls under that first category, the DARPA spokesperson said.

Eventually DARPA plans to integrate each of those technologies into a single system that can spot, raid and neutralize botnet-infected devices without any human involvement. Because the tool would only target botnet malware, people could continue using the devices just as they had before, the agency said in the program announcement.

During phase one of the three-part project, Packet Forensics will build a technology capable of scanning some five percent of global IP addresses and detecting botnets with 80 percent accuracy. By the end of the program, DARPA anticipates the system to analyze 80 percent of the global internet and correctly spot botnets 95 percent of the time.

The effort is scheduled to last to four years, with the first phase running 16 months. Later phases include additional funding.

https://www.nextgov.com/cybersecurity/2018/09/darpa-wants-find-botnets-they-attack/151182/

On the same subject

  • Lockheed refines bid to modernize the Greek frigate fleet. Here's what it's offering.

    September 17, 2021 | International, Naval

    Lockheed refines bid to modernize the Greek frigate fleet. Here's what it's offering.

    The Hellenic Navy wants to buy four new frigates, modernize existing ones and receive an interim capability during the entire process.

  • Thales Naval DRAKON solution enhances interoperability and secure connectivity for naval forces

    November 6, 2024 | International, Naval

    Thales Naval DRAKON solution enhances interoperability and secure connectivity for naval forces

    Naval DRAKON was specifically developed to provide high-data-rate, robust and secure communications between naval vessels, airborne sensors and command centres.

  • Air Force moves to improve electronic warfare effectiveness

    July 10, 2018 | International, Aerospace, C4ISR

    Air Force moves to improve electronic warfare effectiveness

    By: Maddy Longwell   BAE Systems is transitioning its Compass Call electronic warfare system to a new type of aircraft. In a July 9 news release, the company said that under its Cross Deck initiative the system will be used on the more modern and capable EC-37B aircraft, replacing the aging EC-130H aircraft that has been used since 1981. “The cross-decking program enables the Air Force to maintain existing, unmatched EW mission capabilities in an economical business jet that can fly faster, higher, and farther than its predecessor, improving mission effectiveness and survivability,” said Pamela Potter, director of electronic attack solutions at BAE Systems. According to BAE Systems, the EC-37B is a special-mission Gulfstream G550 business jet that is heavily modified to meet Air Force requirements and will provide a more modern electronic attack platform thanks to reductions in weight and operating costs, as well as the ability to operate at a higher altitude and at longer ranges. The Compass Call system enables the Air Force to disrupt enemy command-and-control operations. The system also has enhanced stand-off jamming capability and allows the Air Force to counter communication and radar threats. Modifications to the first G550 have already begun and BAE Systems, which has partnered with L3 Technologies to transition capabilities, says it expects the first two EC-37B with Compass Call to be fielded by 2023, with a total of 10 planned. BAE Systems also said that it will continue to provide support for the EC-130H fleet while the cross-decking continues. https://www.c4isrnet.com/electronic-warfare/2018/07/09/air-force-moves-to-improve-electronic-warfare-effectiveness/

All news