Thursday, September 21, 2023
  • About us
    • Write for us
    • Disclaimer
    • Terms of use
    • Privacy Policy
  • RSS Feeds
  • Advertise with us
  • Contact us
DefenceTalk
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
DefenceTalk
No Result
View All Result

Researchers identify novel cybersecurity approach to protect Army systems

by Army News Service
March 5, 2020
in Cybersecurity
3 min read
0
Researchers identify novel cybersecurity approach to protect Army systems

Army researchers have identified an approach to network security that will enhance the effectiveness and timeliness of protection against adversarial intrusion and evasion strategies. (Photo Credit: U.S. Army Shutterstock)

14
VIEWS

Researchers at the Army’s corporate laboratory in collaboration with the University of California, Riverside have identified an approach to network security that will enhance the effectiveness and timeliness of protection against adversarial intrusion and evasion strategies.

Networked devices and infrastructure are becoming increasingly complex, making it nearly impossible to verify an entire system, and new attacks are continuously being developed.

To rapidly protect Army systems from attack in ways that don’t require massive amounts of manual intervention, the researchers have developed and approach called SymTCP.

SymTCP is a proposed approach that can be used to identify previously unknown ways to bypass deep packet inspection, or DPI, checks in networked appliances, often what internet service providers use to prevent malicious attacks from being launched or to censor certain content.

“Identifying strategies that attackers use to evade DPI in networked systems has been generally a manual process,” said Dr. Kevin Chan, researcher at the U.S. Army Combat Capabilities Development Command’s Army Research Laboratory. “This research provides an automated method to identify potential vulnerabilities in the Transmission Control Protocol, or TCP, state machines of DPI implementation.”

Chan stated that this research has found previously undiscovered vulnerabilities in TCP, which is what the internet is built on; most of internet traffic is TCP. However, it is very difficult to find vulnerabilities in the implementation of TCP, as some of these vulnerabilities are found in obscure parts of the code and require a specific sequence of packets to be sent in order to trigger the vulnerability.

“Our approach uses symbolic execution to explore the state of TCP implementation of an endhost to identify ways to reach critical points in the code,” Chan said. “If such a point is found, then packets can be inserted and be undetected by DPI. This method is evaluated against several state-of-the-art DPI systems such as Zeek and Snort and identifies previously known evasion strategies in addition to new ones that were not previously documented.”

The search space is enormous, and being able to make sense of the state and explore it efficiently is a great achievement, Chan said.

“This research will improve the security of Army networks in terms of being able to protect against future intrusion and evasion strategies,” Chan said. “It has developed an efficient way to find and patch vulnerabilities in future Army network infrastructure.”

According to the researchers, information must be securely transmitted between domains (i.e. air and land) and within domains (i.e. cyber domains) for various Army functions, making this research crucial to each of the Army Modernization Priorities in support of enabling Multi-Domain Operations, with direct applicability to the Army’s Network Modernization Priority.

“This type of research helps focus cyber defense resources,” said Dr. Tracy Braun, computer scientist at CCDC ARL. “It can reveal weaknesses and suggest more efficient deployments of network defenses. This helps protect networks against advanced attacks. It can also help guide the design of future Army network infrastructure and cyber defense strategies.”

This collaborative research endeavor was made possible by ARL’s Cyber Security Collaborative Research Alliance, which has the objective to develop a fundamental understanding of cyber phenomena, including aspects of human attackers, cyber defenders and end users, so that fundamental laws, theories, and theoretically grounded and empirically validated models can be applied to a broad range of Army domains, applications and environments.

CRAs are partnerships between Army laboratories and centers, private industry and academia that are focusing on the rapid transition of innovative science and technology for Army modernization.

“Collaboration by the teams of academic, industry and government researchers in the CRA, including students, builds enduring relationships and maintains a focus on cross-cutting foundational research addressing important Army challenges,” said Dr. Michael Frame, Cyber Security CRA collaborative alliance manager.

The team’s research was accepted to be presented at the Network and Distributed System Security Symposium 2020, which took place Feb. 23-26 in San Diego, California.

The Network and Distributed System Security Symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy and advance the state of available security technologies.

According to Dr. Zhiyun Qian, Everett and Imogene Ross associate professor in the Computer Science and Engineering Department at the University of California Riverside, future research includes the continuous analysis of future generation of DPI boxes, as well as better designs of DPIs that can be made robust against evasion attempts.

Tags: Cyberattacknetwork securitysecurityus army
Previous Post

War crimes judges to rule on ICC probe in Afghanistan

Next Post

China, a Non-Arctic Nation, Meddling in Arctic, Says DOD Official

Related Posts

Trump order targets Chinese internet giants TikTok, WeChat

TikTok hit with UK fine, Australia government ban

April 6, 2023

TikTok was dealt fresh setbacks Tuesday as Australia joined a list of Western nations banning the Chinese-owned apps from government...

US moves closer to retaliation over hacking as cyber woes grow

White House gives federal agencies 30 days to enforce TikTok ban

March 1, 2023

The White House on Monday gave federal agencies 30 days to purge Chinese-owned video-snippet sharing app TikTok from all government-issued...

Next Post
China, a Non-Arctic Nation, Meddling in Arctic, Says DOD Official

China, a Non-Arctic Nation, Meddling in Arctic, Says DOD Official

Latest Defense News

First Shipment of New Gepard Ammunition Now on its Way to Ukraine

First Shipment of New Gepard Ammunition Now on its Way to Ukraine

September 6, 2023
China will ‘never commit to abandoning the use of force’ on Taiwan: Xi

China warns against ‘new Cold War’ as big powers meet in SE Asia

September 6, 2023
US sending 3,000 more troops to Poland, as Ukraine tension rises: senior official

Poland to spend over 4% of GDP on defence in 2024

September 6, 2023
North Korea pursues weapons despite Covid blockade: UN report

North Korea to pay ‘price’ if it gives Russia arms: US

September 6, 2023
USAF F-16 fleet undergoing largest modification work in history

Russia says F-16 fighter jets in Ukraine will be seen as ‘nuclear’ threat

July 13, 2023
North Korea says conducted new test of solid-fuel ICBM

North Korea says conducted new test of solid-fuel ICBM

July 13, 2023

Defense Forum Discussions

  • The Russian-Ukrainian War Thread
  • Royal New Zealand Navy Discussions and Updates
  • Russian Navy Discussions and Updates
  • Royal Australian Air Force [RAAF] News, Discussions and Updates
  • Royal Australian Navy Discussions and Updates 2.0
  • KAI KF-21
  • Indo Pacific strategy
  • Why ASEAN matters - in the era of great power competition
  • Israeli Army News & Discussion
  • European Union, member states and Agencies
DefenceTalk

© 2003-2020 DefenceTalk.com

Navigate Site

  • Defence Forum
  • Military Photos
  • RSS Feeds
  • About us
  • Advertise with us
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports

© 2003-2020 DefenceTalk.com