DHS moves ahead with cybersecurity R&D efforts
New pilot programs will include private sector firms and incident data
Computerworld - SAN MATEO, Calif. -- The Department of Homeland Security is actively planning several new pilot projects that officials hope will help solve one of the most pressing cybersecurity research problems to date: a lack of real-world attack data.
"The cybercommunity has suffered for years from the lack of good data for testing," said Douglas Maughan, security program manager at the Homeland Security Advanced Research Projects Agency, which is part of the DHS's Science and Technology Directorate.
That's why the DHS is moving ahead rapidly with a new program called Protected Repository for Defense of Infrastructure Against Cyber Threats (Predict), said Maughan, who spoke at an industry conference here sponsored by the U.S. Secret Service.
The Predict program has been under way since February and is aimed at getting large private-sector infrastructure companies to volunteer real-world incident data that researchers can use to test prototype security products.
"We're looking to collect large, different types of data," said Maughan. He noted that the government wouldn't hold the data and said those who volunteer for the program can have data "anonymized."
Maughan said the program would rely on a trusted access repository process that includes a government-funded but third-party hosted data repository with written agreements with data providers. Researchers can apply to take part in the program, and data owners would be allowed to stop specific researchers from accessing their data, said Maughan. So far, nearly two-dozen enterprises have indicated interest in the program, which is scheduled to go live after Jan. 1.
The agency is also spearheading a new vender-neutral cybersecurity test bed, known as DETER for Cyber Defense Technology Experimental Research, that will help develop next-generation security technologies for the nation's critical infrastructure. The goal is to construct a homogeneous emulation cluster based on the University of Utah's Emulab facility, said Maughan.
So far, he said, $14 million has been earmarked for the program, which allows researchers to focus on security vulnerability prevention and detection and test the security and trustworthiness of operational systems. The DHS plans to hold an industry day on Sept. 27 to answer questions about the program, and plans to award pilot project contracts in mid-January 2005.
Along with the DETER test bed, the DHS has formed an ad hoc government/industry steering committee to study and develop security pilot projects for the Domain Name System, a critical part of the Internet infrastructure that converts text names of Web sites into Internet Protocol addresses. The goal is to develop pilot projects to study specific threats and vulnerabilities to the DNS, including loss of service due to
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!