Risk
2/23/2010
01:59 PM
50%
50%

Navy Soliciting Cybersecurity Bids

The Office of Naval Research plans to spend $16 million through 2015 to protect its data and secure operations in the event of a cyberattack.

The U.S. Navy is seeking proposals for security technologies to build a prototype system that would ensuring cyber operations aren't shut down in the event of a cyber war.

The Navy plans to spend $16 million through 2015 on the project, according to a notice on the Office of Naval Research Web site.

The notice calls for proposals for a "pro-active cyber network defense and information assurance" solution that can be adapted and integrated into an "advanced prototype."

The prototype "will ensure maximum continuity of cyber operations and availability of national assets and data during cyber conflict," according to the notice.

The Navy also hopes to use the prototype to develop new technologies to protect all data coming and going through the Department of the Navy (DON) networks.

Specifically, the Navy is interested in algorithms for the detection of malware that extend beyond conventional anti-virus detection algorithms, and techniques that discover malware entry points.

Other technologies of interest include: algorithms that can distinguish legitimate network traffic communications from malicious communications; data-mining methods and algorithms for correlating and fusing large-scale complex data sets; security-enabled protocols that ensure proper network functionality during cyber attacks; and protocols that provide network-based configuration and control of security components.

Additionally, proposals are welcome on techniques to map and track the activity of networks and be able to use that information to geo-locate the sources and target of suspicious activity.

The Navy plans to award up to five, and companies have until May 21 to submit proposals.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

CVE-2014-9676
Published: 2015-02-27
The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

CVE-2014-9682
Published: 2015-02-27
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.

CVE-2015-0655
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184.

CVE-2015-0884
Published: 2015-02-27
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.