Want to Win $2 Million? Build DARPA a Better Cyber Defense

Andrey_Popov via Shutterstock

AA Font size + Print

DARPA is offering a $2 million prize to anyone who can build an automated, instantaneous cyber defense for the Pentagon’s networks. By Kedar Pavgi

Hackers of the future beware: you may one day fight against robots safeguarding the Pentagon’s computer networks with instantaneous cyber defenses.

DARPA, the Defense Advanced Research Project Agency, is planning a first-of-a-kind “Cyber Grand Challenge” to help develop an automatic system capable of instantaneously responding to network attacks while also monitoring for vulnerabilities. “With the Cyber Grand Challenge, we intend a similar revolution for information security,” said DARPA program manager Mike Walker, in a statement on Tuesday. “Today, our time to patch a newly discovered security flaw is measured in days. Through automatic recognition and remediation of software flaws, the term for a new cyber attack may change from zero-day to zero-second.”

DARPA says that the competition would include computer security experts from across the country, especially those who regularly participate in the Capture the Flag competitive hacking circuit. The agency expects teams to develop systems that can self-test for security holes, develop software patches and scale its response to all computers on a network, in the blink of an eye. The competition is scheduled to take place in 2016, and the winner would take home $2 million. DARPA hopes that the challenge model, which was used to spark the self-driving car revolution, will also kick-start the development of these automated systems.

Agency officials expect to issue a second call for technologies that support the competition. Interested competitors will be able to learn about the contest when the agency hosts two Challengers’ Days, in Arlington, Va., and on the west coast.

Senior Pentagon officials have long supported the concept of an automated cyber-defense. In an interview with Foreign Policy last September, the Defense Department’s Chief Information Officer Teri Takai said that automated cyber defenses were the only way that the Pentagon would be able to feasibly respond to the daily flood of network attacks.

The competition couldn’t come soon enough. A Pentagon report in May said that the Chinese military and government was targeting “numerous computer systems around the world, including those owned by the U.S. government.” Additionally, the Washington Post cited a confidential report from the Defense Science Board that said that Chinese hackers had broken into the Pentagon’s networks, possibly compromising the designs of many major weapons systems, including the V-22 Osprey and the F-35 Joint Strike Fighter.

“The growth trends we’ve seen in cyber attacks and malware point to a future where automation must be developed to assist IT security analysts,” said Dan Kaufman, DARPA Information Innovation Office director. 

(Image by Andrey_Popov via Shutterstock)

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download
  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Top 5 Findings: Security of Internet of Things To Be Mission-Critical

    As federal agencies increasingly leverage these capabilities, government security stakeholders now must manage and secure a growing number of devices, including those being used remotely at the “edge” of networks in a variety of locations. With such security concerns in mind, Government Business Council undertook an indepth research study of federal government leaders in January 2017. Here are five of the key takeaways below which, taken together, paint a portrait of a government that is increasingly cognizant and concerned for the future security of IoT.

    Download
  • Coordinating Incident Response on Posts, Camps and Stations

    Effective incident response on posts, camps, and stations is an increasingly complex challenge. An effective response calls for seamless conversations between multiple stakeholders on the base and beyond its borders with civilian law enforcement and emergency services personnel. This whitepaper discusses what a modern dispatch solution looks like -- one that brings together diverse channels and media, simplifies the dispatch environment and addresses technical integration challenges to ensure next generation safety and response on Department of Defense posts, camps and stations.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download

When you download a report, your information may be shared with the underwriters of that document.