DHS adds traffic tool to intrusion-prevention program
- By Sean Lyngaas
- Jan 27, 2016
Andy Ozment said a new DHS tool will help telecom companies identify and analyze malicious activity on their customers' networks.
The Department of Homeland Security has added a network traffic analysis tool to a key intrusion-prevention program used by big telecommunications firms.
The addition of Netflow Analysis to DHS' Enhanced Cybersecurity Services program will allow companies to "more effectively identify and analyze malicious activity transiting their customers' networks," said Andy Ozment, DHS' assistant secretary for cybersecurity and communications.
Through the voluntary ECS program, DHS shares classified or sensitive information on cyberthreats with companies that use the information to block exploitations. Firms have the option of providing DHS with anonymized feedback on what cyber intelligence is effective in thwarting threats.
The other two tools under the ECS program are email filtering and Domain Name System Sinkholing, which directs traffic away from malicious domains to safe servers.
Using the netflow capability, the four companies that participate in the program -- AT&T, CenturyLink, Lockheed Martin and Verizon -- receive records from across their enterprises that show traffic flows and volume. They then pick out potentially malicious activity with the help of government intelligence.
The netflow capability "does not enable DHS to collect, store or in any way utilize personally identifiable information," Ozment wrote in a blog post, citing an updated DHS privacy assessment.
"The Netflow Analysis service will operate in passive mode and will not be able to automatically modify or block malicious traffic," the assessment states.
The data retained by the ECS program is subject to a retention schedule sanctioned by the National Archives and Records Administration. DHS' National Protection and Programs Directorate generally deletes cyberthreat information when it is three years old or "no longer needed for agency business," whichever is later, the privacy assessment states.
Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.
Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.
Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.