News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
You are here: Home / Mobile Tech / DARPA's Cyber Contest Not Enough
DDoS Protection Powered By Verisign
Does DARPA's Cyber Challenge Go Far Enough?
Does DARPA's Cyber Challenge Go Far Enough?
By Jennifer LeClaire / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
OCTOBER
24
2013

The Defense Advanced Research Projects Agency (DARPA) is launching what it calls a Cyber Grand Challenge. It’s a tournament, of sorts, to develop fully automatic network defense systems.

DARPA envisions teams creating automated systems that would compete against each other to evaluate software, test for vulnerabilities, generate security patches and apply them to protected computers on a network. A whopping $2 million goes to the team that can bridge the expert gap between security software and cutting-edge program analysis research.

DARPA expects the competition to draw teams of experts from across a wide range of computer security disciplines including reverse engineering, formal methods, program analysis and computer security competition. Second place wins $1 million and third place takes home $750,000.

“Today, our time to patch a newly discovered security flaw is measured in days," said Mike Walker, DARPA program manager. “Through automatic recognition and remediation of software flaws, the term for a new cyber attack may change from zero day to zero second.”

What About the Attacker?

We caught up with Michael Davis, CTO of cyber attack detection service CounterTack, to get his take on the DARPA challenge. He told us he’s excited about the challenge because it drives more awareness of the problem, which he sees growing larger, more complex, and more costly to defend.

Davis applauds DARPA for wanting to change that, but he doesn’t feel the agency is going far enough. That, he said, is because based on the details he’s read DARPA wants to focus on the automatic identification of vulnerabilities and then patches for those vulnerabilities.

“I believe they are missing the largest part of the problem: the attacker,” Davis said. “History has shown us that cybersecurity is an arm's race and while the DARPA challenge will raise the bar, I believe it is akin to providing soldiers with a new semi-automatic weapon while the enemy has an old single shot rifle rather than changing the state of the war.”

Where We Should Focus?

New weapons move the arms race forward, he said, but the fact still remains that attackers will undoubtedly continue to research and identify new ways to breach enterprise security. Those ways, he said, might not be detected by the automated capabilities from DARPA, making them ineffective.

“The ever-changing arms race is why I believe most security teams should focus less on trying to find the unknown zero-day holes that attackers are looking for, which are ever changing, and more on the indicators that show that an attacker has bypassed security controls and is performing unauthorized activity, which are relatively static,” he said.

“If DARPA can incorporate automated analysis of attacker behavior into their challenge I think they will have a much more well-rounded and attacker resistant solution,” he added.

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
MORE IN MOBILE TECH
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Are Government Spies Tipping Off Tor?
Less than a month ago, tech news headlines heralded a Tor Project breach. Now, some are saying that government spies are sharing information with Tor to help it prevent future breaches.
 
Backoff Malware Hits 1,000+ Businesses, Likely More
More than 1,000 businesses across the U.S. might have been affected by Backoff, a new kind of point-of-sale (PoS) malware, according to the Department of Homeland Security.
 
PlayStation Network Back Online After Attack
Sony’s PlayStation and Entertainment Network are back online after a distributed denial of service (DDoS) attack crashed the systems on Sunday. But Sony says no personal info was accessed.
 

Enterprise Hardware Spotlight
Alert: HP Recalls 5 Million Notebook AC Power Cords
HP is recalling about 5.6 million notebook computer AC power cords in the U.S. and another 446,700 in Canada because of possible overheating, which can pose a fire and burn hazard.
 
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.
 

Mobile Technology Spotlight
Verizon Hops on the Voice-Over-LTE Bandwagon
Wireless provider Verizon is gearing up for a nationwide launch of its Voice-over-LTE service over the next several weeks, promising clearer and crisper phone calls and a Skype-like video service.
 
Smartphone 'Kill Switch' Law in California; Will Other States Follow?
California’s new law -- signed by Gov. Jerry Brown on Monday -- aimed at deterring cellphone theft could mean most mobile phones sold in the U.S. will soon include similar “kill-switch” tech.
 
Apple To Replace 'Small Percentage' of iPhone 5 Batteries
If you've noticed your iPhone 5 isn't acting right, it might be because of a bad battery -- and you might be eligible for a replacement. Apple is offering new batteries, though only for a small percentage of users.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.