Risk
2/23/2010
01:59 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Navy Soliciting Cybersecurity Bids

The Office of Naval Research plans to spend $16 million through 2015 to protect its data and secure operations in the event of a cyberattack.

The U.S. Navy is seeking proposals for security technologies to build a prototype system that would ensuring cyber operations aren't shut down in the event of a cyber war.

The Navy plans to spend $16 million through 2015 on the project, according to a notice on the Office of Naval Research Web site.

The notice calls for proposals for a "pro-active cyber network defense and information assurance" solution that can be adapted and integrated into an "advanced prototype."

The prototype "will ensure maximum continuity of cyber operations and availability of national assets and data during cyber conflict," according to the notice.

The Navy also hopes to use the prototype to develop new technologies to protect all data coming and going through the Department of the Navy (DON) networks.

Specifically, the Navy is interested in algorithms for the detection of malware that extend beyond conventional anti-virus detection algorithms, and techniques that discover malware entry points.

Other technologies of interest include: algorithms that can distinguish legitimate network traffic communications from malicious communications; data-mining methods and algorithms for correlating and fusing large-scale complex data sets; security-enabled protocols that ensure proper network functionality during cyber attacks; and protocols that provide network-based configuration and control of security components.

Additionally, proposals are welcome on techniques to map and track the activity of networks and be able to use that information to geo-locate the sources and target of suspicious activity.

The Navy plans to award up to five, and companies have until May 21 to submit proposals.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-5704
Published: 2014-04-15
The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."

CVE-2013-5705
Published: 2014-04-15
apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.

CVE-2014-0341
Published: 2014-04-15
Multiple cross-site scripting (XSS) vulnerabilities in PivotX before 2.3.9 allow remote authenticated users to inject arbitrary web script or HTML via the title field to (1) templates_internal/pages.tpl, (2) templates_internal/home.tpl, or (3) templates_internal/entries.tpl; (4) an event field to ob...

CVE-2014-0342
Published: 2014-04-15
Multiple unrestricted file upload vulnerabilities in fileupload.php in PivotX before 2.3.9 allow remote authenticated users to execute arbitrary PHP code by uploading a file with a (1) .php or (2) .php# extension, and then accessing it via unspecified vectors.

CVE-2014-0348
Published: 2014-04-15
The Artiva Agency Single Sign-On (SSO) implementation in Artiva Workstation 1.3.x before 1.3.9, Artiva Rm 3.1 MR7, Artiva Healthcare 5.2 MR5, and Artiva Architect 3.2 MR5, when the domain-name option is enabled, allows remote attackers to login to arbitrary domain accounts by using the corresponding...

Best of the Web