SBIR-STTR Award

Protection of Naval Computers from Denial-of-Service Attacks
Award last edited on: 6/10/2002

Sponsored Program
SBIR
Awarding Agency
DOD : Navy
Total Award Amount
$667,740
Award Phase
2
Solicitation Topic Code
N94-166
Principal Investigator
James Small

Company Information

Unistry Associates

101 West Eagle Road Suite 201
Havertown, PA 19083
   (610) 853-1313
   cpacpas@aol.com
   N/A
Location: Single
Congr. District: 05
County: Delaware

Phase I

Contract Number: N00014-95-C-0158
Start Date: 4/17/1995    Completed: 10/16/1995
Phase I year
1995
Phase I Amount
$69,722
Flaws that exist in the architecture of networked systems that were once confined to small trusted groups are now being exposed by the interconnection of diverse networks to users of dubious intentions. The technical knowledge to prevent denial- of-service attacks to a wide range of operating systems is beyond most system administrators. Therefore, a taxonomy of service vulnerabilities that includes risk-potential, degree of compromise, motive, and methods to reduce risk without reducing service utility for multiple operating systems is needed. This taxonomy will serve as a guide to administrators as well as be the basis for the development of an intelligent filter to dynamically prevent denial-of-service attacks without over- isolating a network.

Phase II

Contract Number: N00014-96-C-0302
Start Date: 12/1/1997    Completed: 9/29/1999
Phase II year
1996
Phase II Amount
$598,018
The most vexing problem remaining in computer and network security, and one of the most difficult threats to prevent, is the Denial-of-Service (DoS) attack. These prevent legitimate users from accessing data, control, computational or communication resources needed to carry out their missions. This Phase II proposal documents sources of information available on the Internet for DoS attacks, which are the most appropriate types of sources since they are the most timely. It also summarizes and categorizes several DoS attack algorithms, which will allow monitoring and detection facilities to recognize not just specific attack scripts, but whole families of attacks based on the same algorithms. Based on our successful Phase I investigation, an architecture for detecting and responding to these DoS attacks is proposed that is both flexible and extensible and includes the use of existing security components together with intelligent agents. A risk model will also be incorporated to provide cost estimates to match security requirements. A Phase Ii Option is proposed that will allow for the development of a transition plan to commercialize a DoS model through a joint-venture with a firewall vendor.

Keywords:
denial-of-service attacks firewall intelligent agents information security network security r