Small defense project might change the world of networking

BBN helps Air Force protect key systems against malicious attacks

The end of 2009 saw $2.3 billion in awards flow from seemingly every nook and cranny of the Defense Department. But of 32 awards, some topping $300 million, it’s a five-year, $2.9 million Air Force Research Laboratory award that could change the way DOD — perhaps the world — approaches information security.

5 goals of the Advanced Protected Services program

  • Enable networks to withstand attacks that are as yet unknown.
  • Limit the effectiveness of the attacks.
  • Slow the attackers’ progress by building multiple layers they have to penetrate.
  • Let them diagnose the attack more quickly.
  • Help them react and recover more quickly and completely.

Think that sounds like media hype? Listen to this from the chief scientist on the project: “We don’t care if an attack succeeds if it doesn’t have any detrimental effect.”

Or this: “We’re not doing the forensics, and we’re not spending time on new security measures; we’re just using what’s there.”

Lest you think this is some random crank scamming DOD out of retirement money, you should know that Jim Loyall, who is not only chief scientist but also program manager on the project, works for BBN Technologies, the company that developed ARPAnet, which helped create the technologies that helped it grow into the Internet.

Under the Air Force Research Laboratory award, Loyall and four other BBN scientists are developing new approaches to better protect DOD service-oriented architectures (SOA) against malicious attacks. The Advanced Protected Services (APS) program is under the AFRL Information Directorate at Rome, N.Y., and “we hope application of our work will be DOD-wide,” Loyall said.

The target for the APS project is “to create networks that work in a variety of environments, that can face hostile attacks in unknown conditions and still survive and function,” he said.

Intelligence and military networks are susceptible to failure, whether from a simple software fault or hostile attacks. Although “these networks may be protected, some attackers will always get in,” he said.

“What we’re working for is not to completely prevent attacks but to make attacks survivable," he said.

That can’t be done using only conventional security procedures and technologies, he said. “The current state of security is the lockdown, which runs counter to the whole concept of openness and reuse, and it not only can make a network less useful, there are some military systems that can’t be deployed at all.” For example, “you can completely kill performance on a PDA network if you load on multiple layers of encryption.”

BBN researchers are using password protection, authentication and other security techniques that the federal government has adopted, though they weren’t designed to be used in SOA, Loyall said. “When you try to use them together to protect one area, they may leave gaping wide vulnerabilities elsewhere.”

Instead, the team is building extensions to the middleware stacks in SOA, and using strategies such as creating “crumple zones.” A proxy layer between the service and users allows different users to share the same services. “Users go into this initial buffer area, where much of the service functionality is repeated,” he said. “If an attack succeeds, it’ll get some initial success, but it won’t go past that proxy layer to the service itself, and other users will be uncompromised by the attack.”

The work also builds on the work of others, such as BBN partners and the Office of Naval Research, and applies novel concepts, such as virtual private groups and containment regions, Loyall said.

BBN’s work on the program is “really at the confluence of fault tolerance and IT security,” he said.

The company is a unit of Raytheon Co., which completed its $350 million acquisition of BBN, based in Cambridge, Mass., at the end of October. BBN employs 700 employees in seven U.S. locations.

About the Author

Sami Lais is a special contributor to Washington Technology.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close
SEARCH
 Top 100 Slideshow
contracts DB

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Read More

  • Is SBA MIA on contractor fraud? Nick Wakeman

    Editor Nick Wakeman explores the puzzle of why SBA has been so silent on the latest contractor fraud scandal when it has been so quick to act in other cases. Read More

Webcasts