Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF JANUARY 09, 2004 FBO #0773
SPECIAL NOTICE

A -- Proposers Day Announcement - Defense Against Cyber Attacks on Mobile Ad hoc Networks (MANETs)

Notice Date
1/7/2004
 
Notice Type
Special Notice
 
Contracting Office
Other Defense Agencies, Defense Advanced Research Projects Agency, Contracts Management Office, 3701 North Fairfax Drive, Arlington, VA, 22203-1714
 
ZIP Code
22203-1714
 
Solicitation Number
SN04-11
 
Response Due
2/12/2004
 
Archive Date
2/27/2004
 
Point of Contact
Anthony Cicala, Contracting Officer, Phone (571)218-4639, Fax (XXX)XXX-XXX,
 
E-Mail Address
acicala@darpa.mil
 
Description
PROPOSERS DAY ANNOUNCEMENT: The Defense Advanced Research Projects Agency (DARPA) Advanced Technology Office (ATO) announces the Proposers Day for Defense Against Cyber Attacks on Mobile Ad hoc Networks (MANETs). The goal of this Proposers Day Workshop is to discuss the goals of this anticipated effort, provide technical discussion on the topics of interest to the program, promote discussion between industry and government, foster teaming among potential proposers, and answer questions. The objective of Defense Against Cyber Attacks on MANETs is to develop technologies to automatically and dynamically reconfigure Mobile Ad Hoc Network (MANET)-based systems against cyber attack in order to support successful execution of missions in the face of malicious attacks that may include computer worms, malicious code, remote cyber intrusions, and soft and hard run-time failures. Approaches are expected to build technology to be deployed on network nodes that will sense attacks and failures then dynamically reconfigure the networked system as necessary to successfully achieve mission goals. The goals of this program are to: (1) dynamically reconfigure the networked system in the face of malicious attacks and failures, (2) limit false reconfigurations to rare events, and (3) ensure good system throughput does not significantly degrade on average over the duration of an attack between any two source-destination pairs on the MANET. The workshop will be held at the Hyatt Regency Crystal City, 2799 Jefferson Davis Highway, Arlington VA 22202 on February 18, 2004, beginning at 9:00 am and ending at 4:30 pm, to be followed by a reception from 4:30 pm to 6:00 pm. Registration will begin at 8:00 am. The workshop will present an overview of Defense Against Cyber Attacks on MANETs, and include invited presentations, poster session, discussions, and Q&A. If interested in attending the workshop please send an e-mail to Leanne Wiegand, lwiegand@snap.org. You will receive a registration form to fill in and return. Forms should be returned by 12 February 2004 to attend workshop. Due to space limitations, each organization is limited to three people. Workshop attendees must be US Citizens. Attendance at the Proposers' Day is voluntary. Attendance is not required to propose to subsequent Broad Agency Announcements or research solicitations on this topic. It is anticipated that the cost for workshop attendance will be approximately $125 per attendee. DARPA will not provide cost reimbursement for workshop attendance. Workshop participants are invited to present in areas of technical competence related to Defense Against Cyber Attacks on MANETs for purposes of technical discussion and teaming. Areas of technical competence for this program may include in no particular order: wireless networking, information security, reconfigurable logic, hardware design, emergent algorithms, machine learning, stochastic inference and control, distributed fault diagnosis, among others. Due to limited time, presenters will be selected from submitted abstracts for 10-minute time slots, including set-up and break-down. Abstracts must be received by 26 January 2004 and are limited to 250 words. All submitted abstracts will be provided to workshop attendees. If you wish to submit an abstract for presentation consideration, please inform Leanne Wiegand in your initial e-mail. Additionally, there will be a poster session during the workshop. Attendees who wish to prepare posters must contact Leanne Wiegand lwiegand@snap.org for further information about additional costs and restrictions on display of posters. Program information from the Defense Against Cyber Attacks on MANETs Proposers' Day may be posted to the website: http://www.darpa.mil/ato/solicit/MANETdefense/index.htm after the workshop. All materials submitted to and presented at the Defense Against Cyber Attacks on MANETs Proposers Day Workshop must be approved in advance by both the organization that funded the research and the DARPA Program Manager. The DARPA Program Manager will screen the material for sensitive, but unclassified material. For this reason, any material you wish to present at the workshop, including presentations and posters, must be received not later than 12 February 2004 in order to receive consideration. It is the presenters responsibility to ensure the material has been approved for public release by the organization that funded the research. Written confirmation of this approval is requested when the material is submitted for the Program Managers review. Defense Against Cyber Attacks on MANETs starts with the premise that next generation Network Centric Warfare (NCW) systems will experience cyber attacks, hardware and software failures that without the availability of dynamic reconfiguration technology will prevent the successful execution of missions. The most severe cyber threat is expected to be worms with arbitrary payload that can infect and saturate MANET-based networks on the order of seconds. In addition, other attacks and software and hardware failures are expected to impede the ability for distributed applications that run over heterogeneous NCW platforms to successfully execute their missions. As such, human-required response will be insufficient to counter the threat space and to maintain mission integrity in the face of virulent attacks and failures. Network Centric Warfare systems will run powerful computing engines and be highly networked using mobile ad hoc networks where nodes serve as both terminals and routers. Mobile ad hoc networks dynamically form and re-organize in the battlefield from a mixture of heterogeneous platforms including unattended ground sensors (UGS), manned and unmanned ground vehicles, handheld devices, radios, and unmanned air vehicles (UAVs). Together, the varied platforms execute distributed applications in order to achieve the NCW mission. MANET-based systems bring little supporting infrastructure with them, but most of the vulnerabilities of enterprise-class systems that are porous to concerted cyber attacks and worm-based attacks. As a result, in MANET-based systems, power is constrained, bandwidth is limited, connectivity is intermittent, and communication channels are subject to fading, path loss, and a low signal to noise ratio. In addition, MANET-based systems lack a physical security perimeter common to enterprise systems, so MANET nodes can be easily overrun, captured, and reverse engineered. The wireless communication channel provides easy passive analysis and potential for disruption from adversaries. MANET-based systems also exhibit properties of unbounded networks: no single node has global visibility or control over the entire network; network topology and membership is highly dynamic; direct connectivity is limited, participants may be unknown or untrusted; physical and logical network boundaries are unknown and dynamic. Proposed solutions are constrained by properties of unbounded tactical networks such that: (1) any given node has only partial information about the network at any given time, (2) any given node can communicate directly with a number of nodes less than proportional to the total number of nodes in the network, or simply with near neighbors, (3) solutions must utilize the inherently peer-to-peer network topology, (4) nodes may coordinate actions, but each node can only enforce control on itself. The key research challenges that must be addressed in an integrated solution are: (1) distributed detection of malicious/infected/corrupted nodes; (2) dynamic reconfiguration and provisioning of battlefield computing services (e.g., GPS, tracking, common operational picture, threat information) or computational resources via coordinated autonomous operation of nodes ; (3) self-stabilizing behavior within bounded time for dynamic reconfiguration algorithms; (4) distinguishing malicious behavior from legitimate behavior; (5) identifying corrupted components and data to enable automatic reconstitution after attack; and (6) ensuring the cost of the response is much less than the cost of the event. Workshop Point of Contact: Leanne Wiegand, SRS Technologies, lwiegand@snap.org Technical Point of Contact: Dr. Anup K. Ghosh, Program Manager, DARPA/ATO, aghosh@darpa.mil
 
Record
SN00500033-W 20040109/040107212251 (fbodaily.com)
 
Source
FedBizOpps.gov Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.