DARPA To Test Infrastructure Resilience

Increasing risks of cyber-attacks pose a challenge for US infrastructure security, such as the supply of electricity power, water and transportation. A joint exercise examines how to prepare for, and respond to, such a possible attack.

Perspecta Labs, played an integral role in the Defense Advanced Research Projects Agency’s (DARPA) Liberty Eclipse Phase II exercise in collaboration with the Department of Energy and the Department of Homeland Security to test grid recovery tools during a staged, multi-faceted cyberattack on a US power grid.

The realistic exercise actually replicated a cyberattack and monitored its recovery in real-time. Liberty Eclipse Phase II is the fourth and largest thus far in a series of exercises under DARPA’s Rapid Attack Detection Isolation and Characterisation Systems (RADICS) research program.

The RADICS objective was to develop technologies for detecting and responding to cyberattacks on critical US infrastructure, with an ultimate goal of enabling cyber and power engineers the ability to restore electrical service within seven days in the event of a major attack.

During the seven-day exercise, performers on the RADICS program were tasked with using performer-developed tools to provide comprehensive grid situational awareness, restore supervisory control and data acquisition (SCADA) and network infrastructure, cleanse substations and defeat active adversaries to establish two diverse paths in order to re-energize, interconnect and synchronise two utility operators in a black start scenario.

 “Our experience with developing solutions to protect the power grid gave us unique qualifications to support DARPA during this exercise,” said Petros Mouchtaris, Ph.D., president of Perspecta Labs.

“As leaders in cybersecurity awareness, monitoring and assessment services, we were able to validate the success of our research and tools while assisting our customer, DARPA, in achieving this major program milestone.”

In the exercise, Perspecta Labs tested various technologies transitioning to commercial use under the company’s SecureSmart offering.

These included the SHERLOC cyber-weapon hunting system featuring a new grid state consistency analyser called Jolt that integrates ground truth feeder state from Advanced Meter Infrastructure as a telemetry source.

Also the MANTESSA cyber-physical early detection and situational awareness system, featuring novel machine intelligence techniques and statistical inference of out-of-band measurements, field reports and other data sources.

Perspecta Labs also supported BAE Systems on the set up of a Secure Emergency Network. The company’s Distributed Assured and Dynamic Configuration (DADC) tool was used to efficiently generate error-free configurations for that network.

As a result of the exercise, the Perspecta Labs team gained actionable insight from utilities, observers and participants to improve the usability, expand the capabilities and continue the transition of its SHERLOC and MANTESSA solutions.

As a leader in smart grid security and monitoring, the company has been a major contributor on the RADICS program, conducting research and delivering technologies in three of five technical areas for situational awareness, secure communications, and threat detection and characterisation.

PRNewswire

You Might Also Read:

Cyber Attacks On Critical Infrastructure – A New Frontier In Global Conflict:

 

« Lack Of Tech Expertise At Board Level Puts Strategy At Risk
Three Ways the Pentagon Could Improve Cyber Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

World Privacy Forum (WPF)

World Privacy Forum (WPF)

The World Privacy Forum is a non-profit public interest research group that focuses on privacy and technology issues.

CUIng.org

CUIng.org

The CUIng initiative was launched to tackle the problem of criminal exploitation of information hiding techniques.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

ConvergeOne

ConvergeOne

ConvergeOne is a leading global IT services provider of collaboration and technology solutions including cybersecurity.

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

SCS Technology Solutions

SCS Technology Solutions

SCS Technology Solutions has become the preferred partner for top performing organisations across Lincolnshire for IT support and consultancy.