. Military Space News .
CYBER WARS
Top Teams' Automated Cybersecurity Systems Preparing for Final Face-off
by Staff Writers
Washington DC (SPX) Jul 25, 2016


illustration only

The Heartbleed security bug existed in many of the world's computer systems for nearly two-and-a-half years before it was discovered and a fix circulated in the spring of 2014, by which time it had rendered an estimated half a million of the internet's secure servers vulnerable to theft and other mischief.

And while Heartbleed was in some respects an outlier, long-lived critical flaws in widely deployed bedrock internet infrastructure are not rare. Analysts have estimated that, on average, such flaws go unremediated for 10 months before being discovered and patched, giving nefarious actors ample opportunity to wreak havoc in affected systems before they move on to exploit new terrain.

The reason for these time lags? In contrast to the sophistication and automation that characterize so much of today's computer systems, the process of finding and countering bugs, hacks and other cyber infection vectors is still effectively artisanal. Professional bughunters, security coders, and other security pros work tremendous hours, searching millions of lines of code to find and fix vulnerabilities that could be taken advantage of by users with ulterior motives.

But what if that system of finding and fixing flaws were just as fast and automated as the computer systems they are trying to protect? What if cyber defense were as seamless, sophisticated, and scalable as the internet itself?

Those are questions at the heart of DARPA's Cyber Grand Challenge, a multiyear program that is set to culminate in Las Vegas next month at a unprecedented, open-to-the-public cyber defense competition to be held in collaboration with DEF CON, one of the world's largest and most venerable annual hacker conferences.

During the one-day event, computer programs developed by seven remarkable teams will vie for millions of dollars in prizes as they compete in the world's first automated game of Capture the Flag (CTF)-the same game played by top hackers in their annual displays of cyber intrusion and defense acumen.

Playing in a specially created computer testbed laden with an array of bugs hidden inside custom, never-before-analyzed software, the machines will be challenged to find and patch within seconds-not months-flawed code that is vulnerable to being hacked, and find their opponents' weaknesses before the defending systems do. The entire event will be elaborately visualized on giant monitors in the Paris Las Vegas Hotel's 5,000-person-capacity auditorium while expert "sportscasters" document the historic competition.

And it may not end there. The organizers of DEF CON CTF have boldly invited the winning automated system to compete against the world's best human hackers in their Capture the Flag competition the following day, Aug. 5. That would be the first-ever inclusion of a mechanical contestant in that event, and could presage the day when, as eventually happened with chess and Jeopardy!, a computer proves to be the Grand Master of cyber defense.

But let's not get a head of ourselves, said Mike Walker, the DARPA program manager who launched the Cyber Grand Challenge in 2013 and who, for the past year, has been increasingly consumed with leading the elaborate preparations for the final event as separate infrastructure teams test and monitor the synthetic operating system on which the event will play and oversee the installation of gigantic chillers to keep the racks of high-performance computers from overheating on game day.

"Unlike the case with self-driving cars, where the path to full autonomy, while challenging, is now just a matter of technological advances, we still don't know if autonomy involving the kind of reasoning that's required for cyber defense makes conceptual sense," Walker said. "We certainly don't expect any machine to win against humans at DEF CON this year.

But at a minimum we'll learn a lot from seeing how the systems fare against each other, and if we can even provide a clear proof of concept for autonomous cyber defense, that would be revolutionary," he said.

"In the same way that the Wright brothers' first flight didn't go very far but launched a chain of events that quickly made the world a much smaller place, a convincing demonstration that automated cyber defense is truly doable would be a major paradigm shift, and would speed the day when networked attackers no longer have the inherent advantage they enjoy today."

The Cyber Grand Challenge Final Event is free and open to the press, with media opportunities to be scheduled before, during, and after the day's event. For registration and other information, including details and videos about the seven competing teams, please visit www.cybergrandchallenge.com


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
Chinese national jailed for hacking US defense firms
Los Angeles (AFP) July 14, 2016
A Chinese national was sentenced on Wednesday in Los Angeles to three years and 10 months in prison for hacking American defense contractors to steal trade secrets on Beijing's behalf. Su Bin, 51, who went by the names Stephen Su and Stephen Subin, was also ordered by a federal judge to pay a $10,000 fine. Su in March had admitted in a plea agreement with US authorities to conspiring wit ... read more


CYBER WARS
S. Korea confirms anti-missile system site

Moscow to raise US missile shield at NATO summit

Raytheon, Lockheed report successful Patriot tests

N. Korea threatens action over US anti-missile system

CYBER WARS
Russia to deploy latest air defence systems in Crimea

Iran receives S-300 air defense missile system: Report

Raytheon, Kongsberg to produce Naval Strike Missile in U.S.

MBDA fires Brimstone missile from Apache helicopter

CYBER WARS
Facebook internet drone passes first full-scale test

Israel fires missiles at drone from Syria: army

Thales launches Fulmar X drone

India Will No Longer Require Israel's Heron or US Predator Drones

CYBER WARS
Rethinking the Space Environment in a Globalized World

What Industry Can Teach the DoD About Innovation

New Class of RPAs Well Suited to a Variety of Government Uses

MUOS-5 Transfer Maneuver Temporarily Halted, Parked In Safe Orbit

CYBER WARS
State Dept. approves $785 million arms sale to UAE

Russia Tests Parts of 6th Generation, Railgun Equipped Near Space Warplane

Raytheon, USAF test small diameter bomb II system

UK military to lift ban on women in combat roles

CYBER WARS
Russia has $4.6B in military exports in 2016

Guns, not roses: Conflicts fire up Bulgaria arms trade

CAE gets $111 million in UAE defense contracts

Senators look to block U.S. sale of bombs to Saudis for bombing of Yemen

CYBER WARS
Turkey readies cross-party rally against coup, for democracy

Clouds gather for Turkey economy after attempted coup

Germany stresses NATO commitment to allies after Trump comments

Turkey extends police powers, shutters schools after coup

CYBER WARS
Researchers develop faster, precise silica coating process for quantum dot nanorods

Achieving a breakthrough in the formation of beam size controllable X-ray nanobeams

'Nano scalpel' allows scientists to manipulate materials with nanometer precision

Researchers harness DNA as the engine of super-efficient nanomachine









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.