12 septembre 2018 | International, C4ISR

DARPA Wants to Find Botnets Before They Attack

By Jack Corrigan

The defense agency awarded a contract to develop a tool that scours the internet for dormant online armies.

The military's research branch is investing in systems that automatically locate and dismantle botnets before hackers use them to cripple websites, companies or even entire countries.

The Defense Advanced Research Projects Agency on Aug. 30 awarded a $1.2 million contract to cybersecurity firm Packet Forensics to develop novel ways to locate and identify these hidden online armies. The award comes as part of the agency's Harnessing Autonomy for Countering Cyber-adversary Systems program, a DARPA spokesperson told Nextgov.

To build botnets, hackers infect internet-connected devices with malware that allows them to execute orders from a remote server. Because the virus sits dormant most of the time, the owners of infected devices rarely know their computer, smartphone or toaster has been compromised.

Through the HACCS program, DARPA aims to build a system that can automatically pinpoint botnet-infected devices and disable their malware without their owners ever knowing.

Launched in 2017, the program is investing in three main technologies: systems that uncover and fingerprint botnets across the internet, tools that upload software to infected devices through known security gaps, and software that disables botnet malware once it's uploaded. Packet Forensics' technology falls under that first category, the DARPA spokesperson said.

Eventually DARPA plans to integrate each of those technologies into a single system that can spot, raid and neutralize botnet-infected devices without any human involvement. Because the tool would only target botnet malware, people could continue using the devices just as they had before, the agency said in the program announcement.

During phase one of the three-part project, Packet Forensics will build a technology capable of scanning some five percent of global IP addresses and detecting botnets with 80 percent accuracy. By the end of the program, DARPA anticipates the system to analyze 80 percent of the global internet and correctly spot botnets 95 percent of the time.

The effort is scheduled to last to four years, with the first phase running 16 months. Later phases include additional funding.

https://www.nextgov.com/cybersecurity/2018/09/darpa-wants-find-botnets-they-attack/151182/

Sur le même sujet

  • UK restarts frigate competition - but will anyone take part?

    20 août 2018 | International, Naval

    UK restarts frigate competition - but will anyone take part?

    By: Andrew Chuter LONDON - Britain's Ministry of Defence is restarting its contest to build five general purpose frigates for the Royal Navy after it terminated the original competition due to insufficient interest from industry. The Defence Equipment & Support organisation, the MoD's procurement arm, has issued a “prior information notice” informing potential bidders it is moving forward with the Type 31e program, and plans a short period of market engagement with companies or consortia that have expressed interest starting on Aug 20. “We have relaunched discussions with industry for our new Type 31e fleet, and this week issued a Prior Information Notice to ensure we do not lose any momentum. We remain committed to a cutting-edge Royal Navy fleet of at least 19 frigates and destroyers, and the first batch of five new Type 31e ships will bolster our modern Navy,” said an MoD spokesperson. “The purpose of the market engagement is for the Authority [DE&S] to share key elements of the new procurement, including technical and commercial elements. The Authority intends to use the feedback from the market engagement to inform the further shaping of its requirements and commercial construct,” said the DE&S in its announcement it was relaunching the competition. DE&S said suppliers should “only respond if they are in a position to undertake the full Type 31e programme, meeting its full requirement including a £1.25billion cost and building the Type 31e in a UK shipyard.” The Type 31e is a key part of the government's 2017 national shipbuilding strategy which in part seeks to open up the sector to local competition, rather than contract via a non-competitive single source contract with U.K. giant BAE Systems, the world's third largest defense company according to the Defense News Top 100 list. The fast track schedule for the Type 31e calls for the initial vessel to be in service by 2023, replacing the first of 13 Type 23 class frigates due to be retired by the Royal Navy in the period up to the middle of the 2030's. The final Type 31e -- the e stands for export -- is due to be delivered in 2028. Eight of the Type 23's will be replaced by anti-submarine warfare Type 26's. The remainder of the Type 23's will be replaced by the Type 31e. DE&S and industry are up against a time crunch on getting the first Type 31e into service, one which some executives here see as daunting, if not unachieveable, thanks to the need to restart the competition. But despite the delay in getting to the competitive design phase contract announcements, DE&S says it remains committed to the 2023 service date. “A new streamlined procedure will present an opportunity to save time in the overall program. We will release more information about our plans when we have completed the market engagement - which we plan to start from Aug 20,” said a second MoD spokesperson. Full Article: https://www.defensenews.com/naval/2018/08/17/uk-restarts-frigate-competition-but-will-anyone-take-part/

  • Supply chain woes hurting nuclear modernization, Cotton tells Senate

    15 septembre 2022 | International, Autre défense

    Supply chain woes hurting nuclear modernization, Cotton tells Senate

    "It's going to take everyone to understand how to close the gap on supply chain management."

  • Army leaders say this is the service’s ‘secret sauce’

    23 août 2018 | International, C4ISR

    Army leaders say this is the service’s ‘secret sauce’

    By: Mark Pomerleau Both Army leadership and adversaries are recognizing the importance of the network as the foundational weapon system that enables most other functions. “Bottom line, if I could have just one thing, I need a network,” Lt. Gen. Theodore Martin, deputy commanding general of Training and Doctrine Command, said Aug. 21 at TechNet Augusta. “A network that is defended 24/7, around the clock under conditions of adversity, in contact, in the rain with the battlefield.” The head of Army Cyber Command, Lt. Gen. Stephen Fogarty, noted during the same conference that the Russians have figured out the Army's “secret sauce” is the network, along with the data that rides on it and the other weapon systems that leverage it. The Russians understand the capability the network provides after observing the U.S. operate since 1991 and they've developed a strategy to attack it, Fogarty said. As such, Martin noted that the network must be constantly defended from being jammed, interdicted or spoofed. Martin also explained that it can't just be a one-off solution as in years past. The pace of change in technology today is iterating so rapidly that “we can't get into the cumbersome business of getting a server stack and then fielding it to units of action only to find out they're obsolete by the time the third set is issued,” Martin said. Full article: https://www.c4isrnet.com/show-reporter/technet-augusta/2018/08/22/army-leaders-say-this-is-the-services-secret-sauce

Toutes les nouvelles