Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF MARCH 04, 2004 FBO #0829
SOLICITATION NOTICE

A -- BAA04-18 - Defense Against Cyber Attacks on Mobile, Ad Hoc Network Systems (MANETS)

Notice Date
3/2/2004
 
Notice Type
Solicitation Notice
 
NAICS
541990 — All Other Professional, Scientific, and Technical Services
 
Contracting Office
Other Defense Agencies, Defense Advanced Research Projects Agency, Contracts Management Office, 3701 North Fairfax Drive, Arlington, VA, 22203-1714
 
ZIP Code
22203-1714
 
Solicitation Number
BAA04-18
 
Response Due
3/1/2005
 
Archive Date
3/16/2005
 
Point of Contact
Anthony Cicala, Contracting Officer, Phone (571)218-4639, Fax (XXX)XXX-XXX,
 
E-Mail Address
acicala@darpa.mil
 
Description
BROAD AGENCY ANNOUNCEMENT (BAA) 04-18 Defense against Cyber Attacks on Mobile Ad Hoc Network Systems (DCAMANETS); CLOSING DATE: 01 MAR 05; FULL PROPOSALS FOR FIRST SELECTIONS: NOON, Arlington, VA Local Time, 16 April 2004; POC: Dr. Anup Ghosh, DARPA/ATO; Email: BAA04-18@darpa.mil; Web: http://www.darpa.mil/ato/solicit/MANETdefense/index.htm PROGRAM OBJECTIVES AND DESCRIPTION: The Defense Advanced Research Projects Agencys (DARPA) Advanced Technology Office (ATO) is soliciting proposals under this BAA for the performance of research, development, design, and testing to support the Defense against Cyber Attacks on Mobile Ad Hoc Network Systems (DCAMANETS) program. The objective of the DCAMANETS program is to develop technologies to automatically and dynamically reconfigure Mobile Ad Hoc Network (MANET)-based systems against cyber attack in order to support successful execution of missions in the face of malicious attacks including computer worms, malicious code, remote cyber intrusions, mobile network infrastructure attacks, and software and hardware run-time failures. Approaches are expected to build technology to be deployed on network nodes that will sense attacks and failures then dynamically reconfigure the networked system as necessary to successfully achieve mission goals. The quantitative goals of this program are to (1) dynamically reconfigure the networked system in the face of malicious attacks and failures such that in the worst case a worm spreading over the network is contained to a peak infection proportion of infected machines of 10% of vulnerable machines, (2) false reconfigurations are limited to 10% over normal sessions, (3) good system throughput should not degrade more than 75% on average over the duration of an attack between any two source-destination pairs on the MANET, and (4) network overhead generated by distributed detection devices should not exceed more than 10% of baseline good system throughput during normal conditions in order to assure viability in power-constrained environments. The DCAMANETS program starts with the premise that next generation Network Centric Warfare (NCW) systems will experience cyber attacks, hardware and software failures that without the availability of dynamic reconfiguration technology will prevent the successful execution of missions. One of the most severe cyber threats is expected to be worms with arbitrary payload that can infect and saturate MANET-based networks on the order of seconds. In addition, other attacks against the mobile networking infrastructure, overrun, capture, reverse engineering, and run-time software and hardware failures are expected to impede the ability for distributed applications that run over heterogeneous NCW platforms to successfully execute their missions. As such, human-required response will be insufficient to counter the threat space and to maintain mission integrity in the face of virulent attacks and failures. Proposed solutions are constrained by properties of tactical networks such that: (1) any given node has only partial information about the network at any given time, (2) solutions must utilize the inherently peer-to-peer network topology, (3) there exist no concentration points or bottlenecks through which network traffic can be forced or analyzed, and (4) nodes may coordinate actions, but each node can only enforce control on itself. The key research challenges that must be addressed in an integrated solution are: (1) distributed detection of malicious/infected/corrupted nodes from partial observations; (2) dynamic reconfiguration and provisioning of services (e.g., GPS, tracking, common operational picture, threat information) or computational resources via coordinated autonomous operation of nodes ; (3) self-stabilizing behavior within bounded time for dynamic reconfiguration algorithms; (4) distinguishing malicious behavior from legitimate behavior; (5) identifying corrupted components and data to enable automatic reconstitution after attack; and (6) ensuring the cost of the response is much less than the cost of the event. This BAA shall remain open for one (1) year from the date of publication on www.fedbizopps.gov. Although the Government may select proposals for award at any time during this period, it is anticipated that the majority of funding for this program will be committed during the initial selections. Proposers may submit a full proposal in accordance with the instruction provided in the Proposer Information Pamphlet (PIP) at any time up to the proposal due date. In order to be considered during the initial round of funding, full proposals must be submitted to DARPA, 3701 North Fairfax Drive, Arlington, VA 22203-1714 (Attn.: BAA04-18) on or before 12:00 NOON, Arlington, VA Local Time, 16 April 2004. This program will be run at the U.S. SECRET/NOFORN level of classification. A draft program Security Classification Guide (SCG) for this program is available on request and required for guidance on proposal preparation. Performers must have required U.S. personnel clearances, cleared facilities, storage, and processing capabilities to bid on this solicitation as defined in the program SCG. Please see the PIP for important information about proposing on this program as well as details on receiving the draft SCG. The SCG for DCAMANETS is authoritative on all security requirements and guidance. In the event of discrepancies between information presented from this synopsis or the PIP and the SCG, the SCG takes precedence. All responsible sources capable of satisfying the Government's needs may submit a proposal that shall be considered by DARPA. Historically Black Colleges and Universities (HBCUs) and Minority Institutions (MIs) are encouraged to submit proposals and join others in submitting proposals. However, no portion of this BAA will be set aside for HBCU and MI participation due to the impracticality of reserving discrete or severable areas of this research for exclusive competition among these entities. This BAA affords proposers the choice of submitting proposals for the award of a Cooperative Agreement, Contract, Technology Investment Agreement, Other Transaction for Prototype Agreement, or such other appropriate award instrument. However, grants will not be issued under this BAA. The government reserves the right to negotiate the type of award instrument determined appropriate under the circumstances. EVALUATION CRITERIA: The criteria to be used to evaluate and select proposals for this project are, in order of importance: (a) Technical Approach; (b) Multi-Disciplinary Understanding and Approach; (c) Operational Utility; (d) Management Approach & Transition; (e) Potential Contribution and Relevance to the DARPA/ATO Mission; and (f) Cost Realism. Each proposal will be evaluated on the merit and relevance of the specific proposal as it relates to the program rather than against other proposals for research in the same general area, since no common work statement exists. The Government reserves the right to select for award all, some, or none of the proposals received in response to this BAA. The Government reserves the right to select for award, all, some, or none of the parts of a proposal from proposal respondents. Proposals may be selected and/or award decisions made without discussions or negotiations. Additionally, awards may be made without discussions or negotiations. ADDITIONAL GUIDANCE: Proposers choosing to respond to this BAA must read the associated PIP which provides specific information about this BAA, including instructions on how to respond.
 
Web Link
Link to FedBizOpps document.
(http://www.eps.gov/spg/ODA/DARPA/CMO/BAA04-18/listing.html)
 
Record
SN00534943-F 20040304/040302224412 (fbodaily.com)
 
Source
FedBizOpps.gov Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.