DARPA eyes digital fingerprints to track computer attacks

Cyber Genome Program seen as a way to improve investigation of cyberattacks

The Defense Advanced Research Projects Agency is eyeing ways to use the equivalent of digital DNA to improve the ability to investigate cyberattacks, and the agency wants help.

DARPA's Cyber Genome Program is designed “to produce revolutionary cyber defense and investigatory technologies for the collection, identification, characterization, and presentation of properties and relationships from collected digital artifacts of software, data, and/or users to support DoD law enforcement, counter intelligence, and cyber defense teams,” DARPA said in a notice on the Federal Business Opportunities Web site. In other words, the program is meant to explore ways to solve the notoriously difficulty problem of definitively determining who’s behind a cyberattack.

DARPA published the notice to invite people from industry and academia who are interested in participating in the genome program to come to a proposers’ day conference on Jan. 29 in Arlington, Va. Would-be participants have until 5:00 p.m. EST on Jan. 27 to register.

The day is intended for people in industry and academia who are interested in bidding or participating in the project and is in support of a Broad Agency Announcement for the program, DARPA said. The workshop is to promote additional discussion, deal with questions from potential proposers, and provide a forum for teaming opportunities, the agency added.

Digital artifacts that hold key information may be collected from live systems, networks, or collected storage media, DARPA said. The program will include several technical areas of interest with each area developing “the cyber equivalent of fingerprints or DNA to facilitate developing the digital equivalent of genotype, as well as observed and inferred phenotype in order to determine the identity, lineage, and provenance of digital artifacts and users,” according to the agency.

About the Author

Ben Bain is a reporter for Federal Computer Week.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.


  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from Shutterstock.com

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Thu, Jan 28, 2010

The only "Big Brother" I've seen so far in my years of govt service are the foreign governments and hackers constantly attacking our networks and stealing enormous amount of sensitive and critical information for the only reason to harm our country and to advance their own goals. Lets cut the "Big Brother" crap and wake up to the real threat. As a taxpayer, I want my government to protect our data and from been stolen. This does not include everytime my own home PC is attacked by a virus, worm, etc...

Thu, Jan 28, 2010 CMAdmin Long Beach

I'm glad they're looking into it - I have no objection tracing anything I've said or posted, but I do support tracing and punishing those who send malware, spyware, initiate DDOS attacks, deface web sites, and coordinate terrorism.

Wed, Jan 27, 2010 photojack San Diego

I don't find this creepy/scary at all! I wish they would find these hackers who spread viruses, worms and such, and SUE them for all the lost data, time and productivity! They should have to work the rest of their miserable lives, if need be, to pay back the victims of their stupid and senseless crimes. I believe in total victim restitution. Nothing less will suffice!

Wed, Jan 27, 2010

Seems like they could use this to find anybody doing anything online... can you say "Big Brother"?

Wed, Jan 27, 2010

One doesn't really need to read much between the lines to figure out what this is about. Does anyone else find this creepy/scary?!?

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group