@DevOpsSummit Authors: Liz McMillan, Yeshim Deniz, Elizabeth White, Pat Romanski, Zakia Bouachraoui


Machine Hackathon: DARPA Plays Cyber Capture the Flag

Machine Hackathon: DARPA Plays Cyber Capture the Flag

DARPA machine hackathon

A machine hackathon is about to take on a whole new meaning as Defense Advanced Research Projects Agency (DRAPA) prepares to hold it’s first ever machine-only hackathon. With a specific focus on cybersecurity, this cyber version of Capture the Flag (CTF), is DARPA’s way of combating the onset of cyber attacks in real-time. DARPA’s normal approval process is lengthy; once a potential threat is recognized and a software solution has been created, it has to be tested and approved before it can be implemented, and by the time the software fix is ready to be used across the board, another threat looms on their horizon.

Some of you might be asking, “What is DARPA and who are their finalists in this cyber challenge?”

Not to worry, the short video below provides some background and context.

The contest is truly a battle of the minds, as hacker teams try their hand at reverse-engineering software to seek out and find weakness in the system and fix those holes while attacking other machines at the same time. Those teams that are successful in both attacking and fixing holes capture the digital flag and win points in the ongoing process. This competition will take place in conjunction with the annual DEFCON, the longest running annual hacker competition.

Before we start thinking that we’re living a modernized version of “Hackers,” there are a few more things to know. First, this is really a battle of software. The final teams were given a DARPA computer to code and must create a software platform to interact with the DARPA database. Once the competition begins, the teams will not be able to intervene if their software fails to see a weakness or is attacked by another team. The goal is to create an artificial intelligence (AI) software that is capable of responding in real-time to potential threats and weakness within its databases.

DARPA Hackathon

Wired has added this contest to their radar, saying, “DARPA has gone full Tron. It might feel more like a video game, than a hacking contest, as DARPA has arranged for a visual diagram to be displayed on the big screen, that will show each attack and from what machine the attack came from.”

Whether you believe Wired or the other tech experts, this type of machine AI is hoping to turn the tables on the war on cyber safety. Instead of waiting for an attack to strike, DARPA’s intuitive software will attempt to seek out weakness autonomously giving the Defense Department the added edge it needs to prevent leaks in the system.

This is another intriguing example of how machine learning is becoming integrated into so many facets of the world at-large. Whether you make your way to Las Vegas to witness the DARPA’s version of CTF or not, that fact is we continue to add more M2M and IoT solutions to our daily lives. It’s only natural we find new ways to have machines assist us.

More Stories By Scott Allen

Scott is an executive leader with more than 25 years of experience in product lifecycle management, product marketing, business development, and technology deployment. He offers a unique blend of start-up aggressiveness and established company executive leadership, with expertise in product delivery, demand generation, and global market expansion. As CMO of FreeWave, Scott is responsible for product life cycle/management, GTM execution, demand generation, and brand creation/expansion strategies.

Prior to joining FreeWave, Scott held executive management positions at Fluke Networks (a Danaher Company), Network Associates (McAfee), and several start-ups including Mazu Networks and NEXVU Business Solutions. Scott earned his BA in Computer Information Systems from Weber University.

@DevOpsSummit Stories
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
In this presentation, you will learn first hand what works and what doesn't while architecting and deploying OpenStack. Some of the topics will include:- best practices for creating repeatable deployments of OpenStack- multi-site considerations- how to customize OpenStack to integrate with your existing systems and security best practices.
Most DevOps journeys involve several phases of maturity. Research shows that the inflection point where organizations begin to see maximum value is when they implement tight integration deploying their code to their infrastructure. Success at this level is the last barrier to at-will deployment. Storage, for instance, is more capable than where we read and write data. In his session at @DevOpsSummit at 20th Cloud Expo, Josh Atwell, a Developer Advocate for NetApp, will discuss the role and value extensible storage infrastructure has in accelerating software development activities, improve code quality, reveal multiple deployment options through automated testing, and support continuous integration efforts. All this will be described using tools common in DevOps organizations.
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the benefits of the cloud without losing performance as containers become the new paradigm.
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to the new world.