52.6 F
Washington D.C.
Monday, November 28, 2022
spot_img

DARPA to Hold Proposers Day on Cyber Agents for Security Testing and Learning Environments (CASTLE) Broad Agency Announcement

The CASTLE program seeks to generate realistic environments that mimic actual networks.

The Defense Advanced Research Projects Agency (DARPA) Information Innovation Office (I2O) is sponsoring a Proposers Day to provide information to potential proposers on the objectives of the anticipated Cyber Agents for Security Testing and Learning Environments (CASTLE) Broad Agency Announcement (BAA). The CASTLE program seeks to develop an AI-toolkit to instantiate realistic network environments and train cyber agents to enable resilient network operations against advanced persistent threats (APT). CASTLE will formulate network hardening as a reinforcement learning (RL) problem and train defensive agents in open, evolving, and adversarial environments that mimic actual networks. Environments will execute agents inside instrumented subnets that are deployed to live networks and will simulate defensive actions that counter APT tools. Agent execution will produce calibrated datasets for progressively improving simulations. If released, the BAA will be posted on the System for Award Management (SAM) website at https://sam.gov/. This Proposers Day will be held at the unclassified level. There is no fee to attend. This meeting is not open to the general public or members of the media.

The CASTLE program aims to formulate network hardening as a reinforcement learning (RL) problem and teach RL agents to ‘operate through’ the post-breach behavior of widely available penetration testing tools. Over progressive rounds of attack and defense, agents will explore defensive actions to proactively stop on-going attacks while maintaining operationally relevant workflows. CASTLE workflows may encompass critical assets and essential services performed by networks.

The CASTLE program seeks to generate realistic environments that mimic actual networks. In these environments, agents will train to counter APT tools by learning automated defensive actions such as dataprotection policies, firewall rules, and device re-configurations. To support open and evolving training, environments and agents must allow progressive updates such as adding common vulnerabilities and exposures, ports, protocols, and services. Over the course of the program, CASTLE seeks to model networks at greater scale and fidelity and develop agents with more sophisticated defensive actions.

To improve simulations, CASTLE aims to instantiate environments as deployable subnets inside live networks, such that subnets are instrumented to record network and device events. Top performing simulated agents must be able to be instantiated inside subsets as well. Furthermore, the CASTLE program seeks to capture the side-effects of agent actions being executed inside the live network to inform future rounds of agent training. The CASTLE program views agent execution in instrumented subnets as a risk reduction measure intended to ensure simulations do not deviate from reality.

As an important benefit, instantiated environments and captured agent execution enable generation of labeled and continuously updated datasets. CASTLE aims to promote open, rigorous evaluations of defensive approaches by publicly releasing toolkit-generated datasets. Moreover, CASTLE aims for toolkit datasets to serve as standard benchmarks for rigorous measurement of cyber security performance beyond the program. Thus, proposers are encouraged to discuss concepts for publishing datasets to include labeling tool behavior, curating community-driven results, and making datasets amenable to open source machine learning libraries.

Since networks can differ greatly, the CASTLE program seeks research leading to open source standards and software for hardening networks. Indeed, the open source approach is expected to produce technology that is repeatable, portable, and shareable. Moreover, abstracting network hardening enables better collaboration between data scientists, machine learning researchers, and cybersecurity experts. Altogether, CASTLE aims to promote the adoption of a community-developed project that can contribute to collective network defense.

The Proposers Day will be held as a hybrid event on October 24, 2022. DARPA will host two in-person sessions in order to maximize the number of attendees who will participate in-person. Session 1 will be from 9:00AM to 12:00PM (ET), and Session 2 will be from 1:00PM to 4:00PM (ET). Both in-person sessions will be at the DARPA Conference Center, located at 675 N. Randolph Street, Arlington, Virginia, 22203. A virtual option for those who are unable to attend in-person is available through Zoom. Check-in for in-person attendees begins 8:30AM (ET) for Session 1 and 12:30PM for Session 2. Virtual attendees are encouraged to join Zoom ten minutes in advance of meeting start. Information on virtual check-in is available on the Proposers Day Website. Advance registration is required to attend in person.

Attendance at the CASTLE Proposers Day is voluntary and is not required to propose to subsequent solicitations (if any) on this topic. The Proposers Day does not constitute a formal solicitation for proposals. This notification is issued solely for information and program planning purposes, and is not a Request for Information (RFI). Since this is not an RFI, no submissions against this notice will be accepted by DARPA. DARPA will not provide reimbursement for costs incurred to participate in this Proposers Day. Interested parties to this notice are cautioned that nothing herein obligates DARPA to issue a solicitation.

The Proposers Day will include overview presentations by DARPA personnel. There will be a Question & Answer session following the presentations, along with an opportunity for informal teaming discussions. DARPA will consider answering during each session any written questions received inperson or electronically by 11:00AM for Session 1 and by 2:30PM for Session 2 on the CASTLE Proposers Day. Please visit the Proposers Day registration website for a detailed agenda.

Following the Proposers Day, DARPA anticipates posting additional information regarding the CASTLE program (e.g., DARPA materials presented at the Proposers Day and a Frequently Asked Questions [FAQ] document) to https://www.darpa.mil/work-with-us/opportunities.

DARPA hosts Proposer Days to promote teaming arrangements between researchers, provide potential performers with information on whether and how they might respond to the Government’s research and development solicitations, and to increase efficiency in proposal preparation and evaluation. Therefore, Proposer Days are open only to registered potential proposers.

Participants must register in advance through the registration website. Registration is free. In-person attendance is limited to 40 participants per session, and virtual attendance is limited to 200 participants. Early registration is recommended. A maximum of two representatives per organization unit, and five people per overall organization, may attend this Proposers Day virtually. The in-person attendance limit is one per overall organization. Registrants are strongly encouraged to coordinate attendance internally within their organizations prior to registration.

Please register at https://creative.gryphontechnologies.com/darpa/i2o/castle/pd/ no later than 5:00 PM (ET) on October 18, 2022. Attendance is open to individuals who are U.S. citizens, U.S. permanent residents, and foreign nationals.

Read more at DARPA

Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

- Advertisement -

Latest Articles