DARPA To Test Infrastructure Resilience

Increasing risks of cyber-attacks pose a challenge for US infrastructure security, such as the supply of electricity power, water and transportation. A joint exercise examines how to prepare for, and respond to, such a possible attack.

Perspecta Labs, played an integral role in the Defense Advanced Research Projects Agency’s (DARPA) Liberty Eclipse Phase II exercise in collaboration with the Department of Energy and the Department of Homeland Security to test grid recovery tools during a staged, multi-faceted cyberattack on a US power grid.

The realistic exercise actually replicated a cyberattack and monitored its recovery in real-time. Liberty Eclipse Phase II is the fourth and largest thus far in a series of exercises under DARPA’s Rapid Attack Detection Isolation and Characterisation Systems (RADICS) research program.

The RADICS objective was to develop technologies for detecting and responding to cyberattacks on critical US infrastructure, with an ultimate goal of enabling cyber and power engineers the ability to restore electrical service within seven days in the event of a major attack.

During the seven-day exercise, performers on the RADICS program were tasked with using performer-developed tools to provide comprehensive grid situational awareness, restore supervisory control and data acquisition (SCADA) and network infrastructure, cleanse substations and defeat active adversaries to establish two diverse paths in order to re-energize, interconnect and synchronise two utility operators in a black start scenario.

 “Our experience with developing solutions to protect the power grid gave us unique qualifications to support DARPA during this exercise,” said Petros Mouchtaris, Ph.D., president of Perspecta Labs.

“As leaders in cybersecurity awareness, monitoring and assessment services, we were able to validate the success of our research and tools while assisting our customer, DARPA, in achieving this major program milestone.”

In the exercise, Perspecta Labs tested various technologies transitioning to commercial use under the company’s SecureSmart offering.

These included the SHERLOC cyber-weapon hunting system featuring a new grid state consistency analyser called Jolt that integrates ground truth feeder state from Advanced Meter Infrastructure as a telemetry source.

Also the MANTESSA cyber-physical early detection and situational awareness system, featuring novel machine intelligence techniques and statistical inference of out-of-band measurements, field reports and other data sources.

Perspecta Labs also supported BAE Systems on the set up of a Secure Emergency Network. The company’s Distributed Assured and Dynamic Configuration (DADC) tool was used to efficiently generate error-free configurations for that network.

As a result of the exercise, the Perspecta Labs team gained actionable insight from utilities, observers and participants to improve the usability, expand the capabilities and continue the transition of its SHERLOC and MANTESSA solutions.

As a leader in smart grid security and monitoring, the company has been a major contributor on the RADICS program, conducting research and delivering technologies in three of five technical areas for situational awareness, secure communications, and threat detection and characterisation.

PRNewswire

You Might Also Read:

Cyber Attacks On Critical Infrastructure – A New Frontier In Global Conflict:

 

« Lack Of Tech Expertise At Board Level Puts Strategy At Risk
Three Ways the Pentagon Could Improve Cyber Intelligence »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

K2 Integrity

K2 Integrity

K2 Integrity is a preeminent risk, compliance, investigations, and monitoring firm - built by industry leaders to safeguard our clients’ operations, reputations, and economic security.

Digital Arts

Digital Arts

Digital Arts provides internet security software and appliance products for companies and individuals.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

EDGE Group

EDGE Group

EDGE is one of the world’s leading advanced technology groups, established to develop agile, bold and disruptive solutions for defence and beyond.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

Cloudaeris

Cloudaeris

Cloudaeris is a trusted Microsoft Partner, and we've got what it takes to make your business more efficient and agile.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.