PrintPrint

Awards

Topic Information Award/Contract Number Proposal Information Company Performance
Period
Award/Contract
Value
Abstract

H-SB06.1-004
SIGNAL PROCESSING FOR A SOUTHERN BORDER SURVEILLANCE SYSTEM

NBCHC080045 0612002
(FY06.1 Phase II)
Smart Sensor System for a Southern Border Surveillance System

Vista Research, Inc.
2231 Crystal Drive, Suite 515
Arlington, VA 22202-3711

12/19/2007
to
10/18/2008
$999,966.00

Vista Research proposes to deploy and test a baseline implementation of the "Smart Sensors" system evaluated under Phase I and measure the system performance within the context of the Southern Border environment. The Smart Sensors system concept combines low-cost, COTS sensor systems with advanced digital signal processing technologies and algorithms with the aim of providing automated, high-performance wide area search and target discrimination to the U.S. Border Patrol and other government entities. As an option to the main task proposed under Phase II, Vista will also: a.) extend the range and robustness of the system through hardware upgrades, b.) improve the sensitivity and reliability of the system through algorithmic and software upgrades, and c.) realize rapid gains in performance through two additional field experiments that will leverage the lessons learned and insights gained through "real world" experiences in the Southern Border environment. Vista Research anticipates that by the end of Phase II sufficient progress will have been achieved that a fully integrated, real-time operational Smart Sensors capability can be rapidly prototyped, tested, and productized under Phase III, with the goal of pursuing actual deployments within the setting of the Southern Border security infrastructure as soon as possible.

H-SB06.1-007
NETWORK-BASED BOUNDARY CONTROLLERS

NBCHC070127 0612015
(FY06.1 Phase II)
Cross Domain Controller

Trident Systems Incorporated
10201 Fairfax Boulevard, Suite 300
Fairfax, VA 22030-2222

08/20/2007
to
09/30/2009
$749,595.00

The current, dominant approach to implementing secure boundary controls across networks for information exchange is the use of secure Guards. This technology consists of a separate computer system using a trusted operating system and hosting the guarding software and appropriate filters. By definition, the use of a Guard requires that networks be defined as "high side" and "low side" and the Guard system itself must reside within the "high side" domain. While this approach satisfies Department of Defense and Intelligence Community requirements, it has proven to be unworkable and cost prohibitive in the commercial network environment. Trident Systems proposes to leverage the existing technologies from the distributed computing research community and Trident expertise with cross-domain collaboration to develop the Cross Domain Controller (CDC). The CDC will be installed on each network and will eliminate the need for traditional Guard systems. It will provide a secure execution environment for cross-domain information exchange by enforcing the domain specific policies. The CDC system will provide services required to secure the communication medium (authentication, confidentiality, and access control) and capabilities to manage and customize security policies. Additionally, Trident Systems will leverage open source products where possible to minimize the cost for end users.

H-SB06.1-008
BOTNET DETECTION AND MITIGATION

D07PC75274 (formerly NBCHC070120) 0612013
(FY06.1 Phase II)
Inline Botnet Extraction And Response

Endeavor Systems, Inc.
1420 Spring Hill Road, Suite 600
Mclean, VA 22102-3006

09/11/2007
to
03/10/2010
$749,996.11

Inline Botnet Extraction And Response (iBEAR) is a holistic solution of addressing botnets with collection, analysis, and prevention capability. The iBEAR is built on the success of our phase I research of botnet collection. Collection of malware is done through decoy and inline network prevention system to capture target malware and scanning malware without risking the end systems. A hybrid analysis approach uses both Pattern Recognition and Control Flow Graphs (CFG) to determine invariant attributes of the malware communications. The system then implements prevention rules to deny any botnet communication. While excited about our high quality botnet collections being used in Microsoft MSRT, Live OneCare and Window Defender, Endeavor proposes to develop a robust, automated iBEAR which is capable of handling large volume of botnets. Leveraging the FirstLight infrastructure, the generated signatures from iBEAR can be distributed globally across organizations.