The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) and its counterparts in the Netherlands jointly announced on November 16 a total of $2.5 million in collaborative cybersecurity research and development (R&D) across five U.S-Dutch research teams.
The five research teams will collaborate to develop solutions for Distributed Denial of Defense Security (DDoSD) and Industrial Controls Systems Security.
The following organizations received funding awards for their joint U.S-Netherlands projects:
New York University and Delft University of Technology: to design and create a prototype to implement DDoS countermeasures and remediation for in-home networks and Internet of Things (IoT) devices, primarily from attacks using Domain Name System (DNS).
University of Southern California – Information Sciences Institute and University of Twente: to define a framework to counter the IoT DDoS threat by creating tools to reconfigure capabilities in DNS servers and content delivery networks. This framework will be used to create tools to manage anycast (methodology in which a single destination address has multiple routing paths to two or more endpoint destinations) before and during DDoS attacks, and evaluate operational DNS systems.
University of California and University of Twente: to analyze the DDoS attacks focused on exploitation of DNS. Attack sources, targets, and characteristics observed in DDoS attack traffic will be analyzed and an assessment of vulnerabilities and single points of failure that threaten the resilience of the DNS under DDoS attack will be conducted. By combining these two perspectives, actionable intelligence will be used to improve the resilience of the DNS against attacks, while facilitating prevention of DNS attacks.
University of Texas and Technische Universiteit Eindhoven: to create new tools, algorithms, and software to improve the situational awareness of security analysts for ICS. The results will enable security analysts and operators to identify and mitigate threats, and the impact of cyber attacks.
University of California and Vrije Universiteit Amsterdam: to develop a methodology for making patching decisions for ICS software. The methodology will make a determination of the severity of the vulnerability, which will drive a decision on how immediate a patch needs to be applied; Analyze the impact of patches to determine stability or functionality of software; and develop novel methods to apply the hardening only to vulnerable execution paths.