Loren Data Corp.

'

 
 

COMMERCE BUSINESS DAILY ISSUE OF NOVEMBER 16,1999 PSA#2476

Defense Advanced Research Projects Agency (DARPA), Contract Management Directorate (CMD), 3701 N. Fairfax Dr., Arlington, VA 22203-1714

A -- INTRUSION TOLERANT SYSTEMS SOL BAA 00-15 DUE 011000 POC Dr. Jaynarayan Lala, Program Manager, DARPA/ISO, e-mail address: jlala@darpa.mil; Ms. Algeria Tate, Contracting Officer, DARPA/CMD, e-mail address: atate@darpa.mil WEB: http://www.darpa.mil/baa, http://www.darpa.mil/baa. E-MAIL: BAA00-15@darpa.mil, BAA00-15@darpa.mil. The Defense Advanced Research Projects Agency (DARPA) is developing Information Assurance & Survivability (IA&S) technologies for next generation information systems that will support operations envisioned in Joint Vision 2010 (JV2010). The Defense Department's Joint Vision 2010 calls for information dominance in a high-tempo, tightly integrated multi-national environment. To gain dominant battlespace awareness, JV2010 stresses the need for information superiority: the capability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary's ability to do the same. JV2010 also stresses the need for integrating and improving interoperability with allied and coalition forces. To achieve this vision, highly effective Information Assurance and Survivability defense strategies, architectures, and mechanisms are needed to protect our own systems. DARPA seeks innovative systems approaches that are measurably effective against practical attacks. Confidence in effectiveness must be achieved through system-level arguments. The approaches should also support advanced functionality of future systems while maintaining a high level of confidence in the protection effectiveness. They should be cost-effective and scalable in three to five years. The IA&S suite is a closely coordinated group of programs consisting of the following: the Strategic Intrusion Assessment (SIA) program, the Intrusion Tolerant Systems (ITS) program, the Fault Tolerant Networks (FTN) program, the Dynamic Coalitions (DC) program, the Information Assurance (IA) program, the Information Assurance Science and Engineering Tools (IASET) program, the Autonomic Information Assurance (AIA) program, and the Cyber Command and Control (CC2) program. The programs will be coordinated by focusing on joint experimentation, sharing of laboratory facilities for experimentation, annual joint Principal Investigator meetings, and joint monthly meetings between DARPA Program Managers and Systems Integrators (for those programs with significant integration roles) to exchange information, enhance innovation, and reduce redundancy. Of the eight programs in the IA&S group, only the Intrusion Tolerant Systems program is of interest in this solicitation. The other seven programs, the SIA, IASET, FTN, AIA, CC2, DC, and IA are not part of this solicitation and will not be discussed further. PROGRAM OBJECTIVES AND SCOPE: Intrusion Tolerant Systems Program OBJECTIVE. The goals of the Intrusion Tolerant Systems Program are to conceive, design, develop, implement, demonstrate, and validate architectures, methods, and techniques that would allow fielding of intrusion resilient and intrusion tolerant systems. An intrusion tolerant system (ITS) is an information system that continues to function correctly and provide the intended user services in a timely manner even in the face of an attack. Such a system will detect information attacks that have successfully penetrated the outer layers of defenses provided by avoidance and preventive measures. The system will respond by taking actions that are necessary to enable continued correct functioning of critical applications. These actions may range from confinement of suspect code and data to reconfiguration of hardware and software resources. Function triage and resource reallocation may be performed to gracefully degrade system capabilities. Intrusion Tolerant Systems Program SCOPE. There are five major security attributes: confidentiality, integrity, availability, authentication, and non-repudiation. The ITS program will focus on maintaining data and program integrity and countering denial of service attacks. The systems of interest to the ITS program are the mission-critical elements of the Defense Information Infrastructure. These may range from small-scale embedded information systems to large, distributed networks of computers. TOPIC AREAS: (1) Tolerance Technologies: To make systems resilient to intrusions/attacks, it is necessary to provide a set of capabilities that are, in general, absent from COTS systems. Research proposals are sought that will identify intrusion tolerance capabilities and functions and propose architectural solutions to provide those capabilities and functions. The solutions must be characterized by a cost / benefit analysis. The cost may be measured in loss of performance, functionality, or affordability. The benefits are measured in increased integrity and availability. To utilize advanced attack warnings effectively, it is desirable to have tolerance mechanisms that can be invoked, perhaps at some additional temporary cost, to make mission-critical systems more resilient to attacks and move the system to a higher "INFOCON" readiness level. Novel architectures that can rapidly transform themselves into a higher level of resilience are, therefore, also of interest in this BAA. (2) Tolerance Triggers: Tolerance mechanisms may be active at all times or they may require a trigger to be invoked. Intrusion detectors being developed by other IA&S programs can certainly be used as a trigger. The state-of-the-art of Intrusion Detection Systems (IDS's) is such that a very high false alarm rate and a very low coverage of intrusions is the norm. This is expected to improve in the future. However, for mission-critical applications, even IDS's with a low false alarm rate, if used to trigger a reconfiguration, for example, may cause a self denial-of-service. Therefore, it is necessary to explore other avenues for invoking tolerance mechanisms that can augment intrusion detectors as triggers. Research proposals are sought that will result in innovative tolerance triggers. Ideally, such triggers would have a very high coverage, that is, a very high probability of detecting errors caused by intrusions/attacks and a zero false alarm rate. The errors should be detected at the earliest possible stages before they propagate throughout the system. For example, if the architecture relies on redundant elements for survival, then it is especially important that the error is detected before all replicas have been corrupted. It is also important to detect the errors before they affect the tolerance mechanisms. The proposals should also identify a methodology for evaluating the efficacy of the proposed tolerance triggers. Multidisciplinary approaches that combine the disciplines of security and fault tolerance are sought. By combining security and fault tolerance expertise, we expect to leverage the knowledge brought by both disciplines, extend the results and capabilities already developed in both areas, and avoid solving old problems with already-known solutions. (3) Alternative Innovative Intrusion Tolerance Technologies: Proposers are also encouraged to think beyond the above two topic areas and approaches and submit alternative innovative ideas that would meet the objectives of the ITS program, and are within the ITS program scope and time-frame. ADDITIONAL CONSIDERATIONS: Offerors should identify the specific area(s) they are addressing. In their proposals, they should describe the requirements of the area from their perspective, describe the key technical challenges and identify why they are a challenge. They should describe their approach and indicate why they will be successful, particularly if other approaches have not been. Proposals that address greater parts of the problem space, through innovative integration of component technologies, are highly desired. Technologies with broad application, e.g., apply in Unix and NT environments, are also of great interest. The following is the anticipated funding level ($ in millions) FY00 (4.5), FY01 (9.0), FY02 (14.0), FY03 (14.0). GENERAL INFORMATION: DARPA will not accept classified proposals to BAA 00-15. Abstracts in advance of actual proposals are not required, and will not be reviewed. Proposers must submit an original and two hard copies of full proposals as well as five disk copies in time to reach DARPA by 4:00 PM (local time), Monday, January 10, 2000, to be considered for the initial evaluation. Proposers must obtain a pamphlet, BAA 00-15 Proposer Information Pamphlet (PIP), which provides further information on the areas of interest, submission, evaluation, funding processes, and full proposal formats. This pamphlet will be available November 18, 1999, and may be obtained by electronic mail, or mail request to the administrative contact address given below, as well as at URL address http://www.darpa.mil/baa. Proposals not meeting the format described in the pamphlet may not be reviewed. This Commerce Business Daily notice, in conjunction with the pamphlet BAA 00-15, Proposer Information Pamphlet, constitutes the total BAA. No additional information is available, nor will a formal RFP or other solicitation regarding this announcement be issued. Requests for same will be disregarded. The Government reserves the right to select for award all, some, or none of the proposals received. All responsible sources capable of satisfying the Government's needs may submit a proposal that shall be considered by DARPA. Historically Black Colleges and Universities (HBCU) and Minority Institutions (MI) are encouraged to submit proposals and join others in submitting proposals. While no portion of this BAA can be set aside for HBCU and MI participation due to the impracticality of reserving discrete or severable areas of this research for exclusive competition among these entities, DARPA strongly advocates the involvement of the entire academic community to explore innovative solutions to this important technical problem. EVALUATION CRITERIA: Evaluation of proposals will be accomplished through a scientific review of each proposal using the following criteria, which are listed in descending order of relative importance: (1) Overall scientific and technical merit; (2) Innovative technical solution to the problem; (3) Potential contribution and relevance to DARPA mission; (4) Offeror's capabilities and related experience; (5) Plans and capability to accomplish technology transition; (6) Best value. ORGANIZATIONAL CONFLICT OF INTEREST: Awards made under this BAA are subject to the provisions of the Federal Acquisition Regulation (FAR) Subpart 9.5, Organizational Conflict of Interest. All offerors and proposed subcontractors must affirmatively state whether they are supporting any DARPA technical office(s) through an active contract or subcontract. All affirmations must state which office(s) the offeror supports and identify the prime contract number. Affirmations shall be furnished at the time of proposal submission to the Contracting Officer. All facts relevant to the existence or potential existence of organizational conflicts of interest, as that term is defined in FAR 9.501, must be disclosed. This disclosure shall include a description of the action the Contractor has taken, or proposes to take, to avoid, neutralize or mitigate such conflict. If the offeror believes that no such conflict exists, then it shall so state in this section. Restrictive notices notwithstanding, proposals may be handled, for administrative purposes only, by a support contractor. This support contractor is prohibited from competition in DARPA technical research and is bound by appropriate non-disclosure requirements. Only Government officials will evaluate. Posted 11/12/99 (W-SN400270). (0316)

Loren Data Corp. http://www.ld.com (SYN# 0008 19991116\A-0008.SOL)


A - Research and Development Index Page