recommended reading

DHS to expand cybersecurity program for researchers

The Homeland Security Department asked on Wednesday for comments on the latest version of forms that determine who is eligible to access a repository of computer and network data for cybersecurity research and development.

DHS posted a notice in the Federal Register inviting comments on a package of forms it uses to give individuals access to data about cybersecurity incidents that targeted the computer networks of organizations, including academia, industry and nonprofits, that participate in the program.

The forms, which were updated in April, support the Protected Repository for the Defense of Infrastructure Against Cyber Threats program, or PREDICT. Homeland Security's Science and Technology Directorate created the program to make information on real cyberattacks available to researchers and developers so they can test technology solutions. The program's portal, which launched 18 months ago, is managed by the nonprofit research institute RTI, and the data is housed in servers at five different data center sites.

"We provide the marriage between the researcher looking for data and the data provider," said Douglas Maughan, program manager within the command, control and interoperability division of the directorate. "A lot of organizations want to help the research community, because quality research can help them [in return]. But typically that means doing a nondisclosure agreement with each. If we have this system built, they don't have to deal with these researchers one on one."

The onus is on the organization to strip out information that could compromise personal privacy and to ensure providing the cyber data doesn't violate corporate policy, he said. More than 100 data sets are stored in the repository, provided primarily by universities and nonprofit organizations. Only one commercial organization submits information to the program, although DHS hopes to convince more companies to do so.

Among the data sets stored in the repository is network traffic information, including source and destination IP addresses, which researchers can analyze to learn more about denial of service attacks that temporarily block access to a network, for example. Also included is black hole address space data -- network packets destined for unused Web addresses that often are linked to malicious Internet activity.

Phase 2 of the program, which DHS recently started, will incorporate what Maughan called "controversial data sets," which could be more sensitive and include personally identifiable information. DHS officials said their goal is to help researchers create ways to protect data. Maughan said legal and privacy considerations are taken seriously to ensure no data is compromised.

"This has been a crawl, walk, run process, and we're between crawl and walk -- trying to do better marketing to get the word out, and gathering examples from the research community of how they've [utilized data from our program] to show value," he says.

Threatwatch Alert

Stolen laptop

Wireless Heart Monitor Maker to Pay $2.5M Settlement to HHS After Laptop Stolen

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.