Date: 12/03/2024
Vendor: Center for Applied Internet Data Analysis (CAIDA)
Technology/Topic: AVOID – Automatic Verification of Internet Data-Paths
URL: https://caida.org/projects/avoid
TEM Presentation Video (milTube)
______________________________________________
Welcome to the Technical Exchange Meeting (TEM)!
Department of Defense (DOD) use of worldwide commercial networks entails reliance on untrusted third-party communications infrastructure, which can potentially expose communications to an adversary. Increasingly complex obfuscation techniques have created an arms race against network intelligence techniques to detect the obfuscation. With each new obfuscation, DOD can never know if it fools the adversary, or if the adversary is simply lulling DOD into a false sense of security. The next great capability leap for operating through unknown networks will come from sophisticated analytics that provide situational awareness of threats, and an implementation that dynamically routes communications along benign (i.e., unobservable by the adversary) paths. This project proposes a system — Automated Verification of Internet Data-paths (AVOID) — that provides this unprecedented capability through two subcomponents (AVOID-Path and AVOID-Vendor) that tackle high risk attack vectors for commercial communications.
AVOID-Path combats the ability of our adversaries to apply sophisticated and complex network analytics to any DOD communications that traverse networks or territory they control. AVOID-Path will embed topologic and geographic awareness into a routing system and provide a mechanism for DOD’s communications to avoid adversary-controlled territory across the global Internet and provide safe paths to DOD-controlled networks. This capability will provide end-to-end adversary avoidance without requiring modification to existing applications or routers in DOD networks, or cooperation by any third-party network.
AVOID-Vendor targets the potential for adversaries to control commercial (4G or 5G) base stations anywhere in the world, allowing them to subvert DOD communications at the point of entry into the wireless network. AVOID-Vendor will recognize malicious and surveillance base stations and provide a mechanism for DOD devices to connect to specific benign base stations.
______________________________________________
To join the DISA TEM mailing list, please contact: disa.tem@mail.mil
______________________________________________
Disclaimer:
— TEMs do not serve as a marketing venue or request for proposal actions.
— TEMs shall not be interpreted as a commitment by the Government to issue a solicitation or ultimately award a contract.
— TEMs do not serve as an endorsement of any presented technologies or capabilities
— Presentations will not be considered as proposals nor will any awards be made as a result of a TEM session.
— TEMs are public open forums – no proprietary or sensitive information should be presented during TEM sessions. Only publicly facing content is permissible in DISA TEM sessions.