The Pentagon has in mind a three-pronged counterattack against a decades-old form of cyber assault that continues to paralyze government and industry networks, despite its low cost of sometimes $10 a hit.
Beginning next spring, military-funded researchers are scheduled to produce new tools that would quickly enable organizations to bounce back from so-called distributed denial-of-service attacks.
A recovery rate of at most 10 seconds is the goal, according to the Defense Department.
Today, attackers have a relatively easy time aiming bogus traffic at computer servers to knock them offline. One reason is that computer systems often are consolidated, making for a wide target area. Another weakness is the predictable behavior of systems that support Web services. And finally, certain types of DDoS attacks that evince little malicious traffic go undetected.
Researchers chosen by the Defense Advanced Research Projects Agency will attempt to deny attackers such openings through a three-year program called Extreme DDoS Defense, according to Pentagon officials. The tentative start date is April 1, 2016.
The stability of agency operations, banking, online gaming and many other daily activities are at stake here.
A DDoS attack against Estonia in 2007 allegedly orchestrated by Russian-backed hackers downed government and industry Internet access nationwide for two weeks. More recently, crooks have begun offering Luddites DDoS-for-hire services at subscription rates of $10-$300 a month, according to journalist Brian Krebs.
Lizard Squad, a major provider, allegedly was behind several persistent attacks on online gaming services Xbox and PlayStation. A string of 2011 cyber assaults against Wall Street banks, including Capital One and SunTrust Banks, was attributed to Iranian hackers.
Just this month, at the annual Black Hat security conference in Las Vegas, Trend Micro researchers said they observed attackers trying to overpower systems in Washington that monitor the physical security of gas pumps. Luckily, the devices were fake “honeypot” traps.
“Responses to DDoS attacks are too slow and manually driven, with diagnosis and formulation of filtering rules often taking hours to formulate and instantiate. In contrast, military communication often demands that disruptions be limited to minutes or less,” DARPA officials said in an Aug. 14 announcement about the new program.
The funding level for the project was not disclosed but multiple grants are expected to be awarded. Interested researchers must submit proposals by noon Oct. 13.
XD3 will endeavor to thwart DDoS attacks by “dispersing cyber assets” in facilities and on networks, officials said. Currently, the problem is that cloud computing arrangements and other critical infrastructure systems “rely heavily on highly shared, centralized servers and data centers,” they added.
The new tools also will try “disguising the characteristics and behaviors of those assets” to complicate the planning of DDoS launches, officials said.
The trick with so-called “low-volume” DDoS attacks is they do not look like traffic overloads. The external computer messages seem benign but are actually exhausting a system’s memory or processors. One workaround here might be sharing information among systems that then can “decide collectively whether attacks have occurred, and/or to determine what mitigations might be most effective,” officials said.
One group of XD3 researchers will be assigned to inspect the designs for unintended security holes.
Anyone wanting to be a reviewer must hold a top-secret clearance, according to the contract rules.
“The objective of design reviews is the proactive identification of weaknesses and vulnerabilities that would reduce the effectiveness of DDoS attack detection or mitigation,” officials said. The idea also is to “apprise performers of potential DDoS attack methods or features that they might not have considered.”
What We're Following See More »
"An emerging government funding deal would see Democrats agree to $15 billion in additional military funding in exchange for the GOP agreeing to fund healthcare subsidies, according to two congressional officials briefed on the talks. Facing a Friday deadline to pass a spending bill and avert a shutdown, Democrats are willing to go halfway to President Trump’s initial request of $30 billion in supplemental military funding."
The Michael Flynn story is not going away for the White House as it tries to refocus its attention. The White House has denied requests from the House Oversight Committee for information and documents regarding payments that the former national security adviser received from Russian state television station RT and Russian firms. House Oversight Chairman Jason Chaffetz and ranking member Elijah Cummings also said that Flynn failed to report these payments on his security clearance application. White House legislative director Marc Short argued that the documents requested are either not in the possession of the White House or contain sensitive information he believes is not applicable to the committee's stated investigation.
The Washington, D.C. area will undergo "a full-scale exercise" Wednesday morning "designed to prepare for the possibility of a complex coordinated terror attack in the National Capital Region." The drill will take place at six different sites throughout the District of Columbia, Maryland, and Virginia. The drill should not be taken as a sign that emergency services are expecting an attack, said Scott Boggs, Managing Director of Homeland Security and Public Safety at the Metropolitan Washington Council of Governments.
The Presidential Inaugural Committee "acknowledged late Monday that a final report it filed with the Federal Election Commission this month was riddled with errors, many of which were first identified through a crowdsourced data project at HuffPost." The committee raised about $100 million for the festivities, but the 500-page FEC report, which detailed where that money came from, was riddled with problems. The likely culprit: a system of access codes sent out by the GOP's ticketing system. Those codes were then often passed around on the secondary market.