Air Force Research Laboratory (AFRL)/IF, in conjunction with the Advanced Research and Development Activity (ARDA), is soliciting white papers for various scientific studies and experiments to increase our knowledge and understanding of the broad range of capabilities required in support of Network Attack Traceback, to include beta testing of prototype capabilities. Solutions to basic and applied research and engineering traceback problems using innovative approaches are sought. This includes high-risk, high-payoff capabilities for non-cooperative and/or hostile network environments. The scope of this effort concerns the development of various tools and techniques that provide capabilities which will increase our knowledge of the true source of a network attack, ideally to the originating host, using solely technical means. We are particularly interested in tracing attacks that would compromise the confidentiality and integrity of information on Intelligence Community (IC) networks. These IC networks include the NIPRNET, SIPRNET, JWICS, and IC enclaves. Techniques designed for tracing Denial-of-Service attacks in IC networks are NOT the focus of this BAA, nor are techniques that involve probabalistic packet marking. ARDA is especially interested in traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques.
Who can apply:
Eligible functional categories:
Air Force Defense Research Sciences Program
Full Announcement of BAA 05-04-IFKA
If you have problems accessing the full announcement, please contact:
Department of the Air Force, AF Research Lab, Information Directorate, Acquisition Management Branch