Cybersecurity

DHS adds traffic tool to intrusion-prevention program

Andy Ozment said a new DHS tool will help telecom companies identify and analyze malicious activity on their customers' networks.

The Department of Homeland Security has added a network traffic analysis tool to a key intrusion-prevention program used by big telecommunications firms.

The addition of Netflow Analysis to DHS' Enhanced Cybersecurity Services program will allow companies to "more effectively identify and analyze malicious activity transiting their customers' networks," said Andy Ozment, DHS' assistant secretary for cybersecurity and communications.

Through the voluntary ECS program, DHS shares classified or sensitive information on cyberthreats with companies that use the information to block exploitations. Firms have the option of providing DHS with anonymized feedback on what cyber intelligence is effective in thwarting threats.

The other two tools under the ECS program are email filtering and Domain Name System Sinkholing, which directs traffic away from malicious domains to safe servers.

Using the netflow capability, the four companies that participate in the program -- AT&T, CenturyLink, Lockheed Martin and Verizon -- receive records from across their enterprises that show traffic flows and volume. They then pick out potentially malicious activity with the help of government intelligence.

The netflow capability "does not enable DHS to collect, store or in any way utilize personally identifiable information," Ozment wrote in a blog post, citing an updated DHS privacy assessment.

"The Netflow Analysis service will operate in passive mode and will not be able to automatically modify or block malicious traffic," the assessment states.

The data retained by the ECS program is subject to a retention schedule sanctioned by the National Archives and Records Administration. DHS' National Protection and Programs Directorate generally deletes cyberthreat information when it is three years old or "no longer needed for agency business," whichever is later, the privacy assessment states.

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


Featured

  • FCW Perspectives
    human machine interface

    Your agency isn’t ready for AI

    To truly take advantage, government must retool both its data and its infrastructure.

  • Cybersecurity
    secure network (bluebay/Shutterstock.com)

    Federal CISO floats potential for new supply chain regs

    The federal government's top IT security chief and canvassed industry for feedback on how to shape new rules of the road for federal acquisition and procurement.

  • People
    DHS Secretary Kirstjen Nielsen, shown here at her Nov. 8, 2017, confirmation hearing. DHS Photo by Jetta Disco

    DHS chief Nielsen resigns

    Kirstjen Nielsen, the first Homeland Security secretary with a background in cybersecurity, is being replaced on an acting basis by the Customs and Border Protection chief. Her last day is April 10.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.