DOD network attacks level off

The number of detected attacks on unclassified Defense Department networks

has leveled off this year, according to the commander who's in charge of

protecting them.

The number of detected "cyber events" on DOD's Non-Classified Internet Protocol

Router Network increased dramatically from 780 in calendar year 1997 to

22,144 in 1999, said Army Maj. Gen. James Bryan, director of the Joint Task

Force for Computer Network Defense.

But the number of cyber events has steadied: from 01/through October

of this year, there were 20,414, he said.

Bryan spoke Tuesday at the Armed Forces Communications and Electronics Association's

TechNet Asia-Pacific 2000 conference in Honolulu.

"We're better at detecting what level of activities there are," on DOD networks,

Bryan said. JTF-CND officials use "strict definitions" to define a cyber

event, and each event has to fulfill the requirements of seven categories,

he said.

The importance of having common criteria for what constitutes a cyber event

came up earlier on Tuesday, when Lt. Gen. Edwin Smith, commanding general

for U.S. Army Pacific, said there are 800,000 "hits" each week on his networks

from hackers. "And they're not all high school hackers," he added.

Ninety-seven percent of the time, intrusions into DOD systems could have

been prevented with better systems configurations, Bryan said. To address

that problem, the DOD CIO Executive Board is expected to sign a directive

for ports and protocol configuration control by the end of the month, he

said.

JTF-CND also has developed a single database covering all DOD organizations'

cyber events, Bryan said. Like his predecessor at JTF-CND, Air Force Maj.

Gen. John Campbell, he expressed frustration that the organization can't

do reconnaissance on cyber intruders who aren't in .mil domains.

Featured

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.