Air force 7. Small Business Innovation Research (sbir) Phase I proposal Submission Instructions



Yüklə 1,01 Mb.
səhifə10/30
tarix26.07.2018
ölçüsü1,01 Mb.
#59007
1   ...   6   7   8   9   10   11   12   13   ...   30

We are seeking innovative solutions to provide BMC2 and NC3 in the improved HTHF environment for global mobility, global strike, and strategic military missions. In addition, operating with overseas flight following, tracking, and air traffic control, develop approaches to utilize the 100-200 Kbps communications environment. Develop solutions for multiple-and single-hop HTHF communications. Develop solutions for HTHF propagation prediction and performance enhancement based on current conditions sensed at endpoints of current and recent-past communications exchanges. Incorporate accepted accelerator solutions for certain data types (e.g., XML) to take maximum advantage of limited throughput, perhaps achieving 2x to 50x acceleration rates of HTHF communications. Perform the modeling and simulation (M&S) necessary to verify and validate the performance of the developed solutions.

PHASE I: Provide demo of efficient and effective BMC2, NC3, and ATC apps utilizing low-speed HF comm speeds. Provide recommended approach(es) to interfacing with HTHF system. Address security approaches and develop proposed architecture that would ensure secure passing of sensitive or classified information. Verify and validate performance w/M&S.

PHASE II: Develop approved Technology Transition Plan (TTP) for Phase III activities. Provide robust demonstration and test of, at least, 5 separate BMC2 applications adjusted/invented for next-generation high-throughput HF, and 3 situation awareness (SA) tools. Develop and execute test plan for long-distance communications within US states and territories at appropriate facilities; provide feedback loop using approved circuits.

PHASE III DUAL USE APPLICATIONS: Execute ways ahead outlined in Phase II TTP. Incorporate success BMC2 and situation awareness (SA) applications on target platforms, including air and surface. Provide robust testing of selected applications in operationally-relevant environment.

REFERENCES:

1.  Eric E. Johnson, Erik Koski, William N. Furman, Mark Jorgenson, John Nieto, "Third Generation and Wideband HF Communications," Artech House, Norwood MA, 2013.

2. STANAG 5066. "Profile for High Frequency (HF) Radio Data Communications." Edition 3 (Ratification Request), North Atlantic Treaty Organization, 2010.

3.  STANAG 4538: "Technical Specifications To Ensure Interoperability Of An Automatic Radio Control System For HF Communication Links". Edition 1, North Atlantic Treaty Organization, 2009.

4.  William N. Furman, Eric Koski, John W. Nieto, "Design and System Implications of a Family of Wideband HF Data Waveforms",www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA584160, 2010.

5.  Jeffery Weston, Wric Koski, "High Frequency Radio Network Simulation Using OMNeTT++", Proceedings of the OMNET++ Community Summit 2015.

6.  J. Nieto, "Coding and Interleaving Options for Wideband HF Waveforms", The Nordic Shortwave Conference HF10, Faro, Sweden, 2010.www.nordichf.org.

KEYWORDS: ATC, NC3, HTHF, HF, BMC2, C3, C2, high frequency, application, command-control, command-control-communications, nuclear command control communications, winlink




AF171-039

TITLE: Data Protection and Sharing Technologies In Critical Key Networks and for Cyber Defense of Weapons (DPSTICK)

TECHNOLOGY AREA(S): Battlespace, Electronics, Sensors

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 5.4.c.(8) of the solicitation and within the AF Component-specific instructions. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. Please direct questions to the AF SBIR/STTR Contracting Officer, Ms. Gail Nyikon, gail.nyikon@us.af.mil.

OBJECTIVE: Develop efficient data protection and sharing technologies for Airborne Networks.

DESCRIPTION: Airborne networks are envisioned as an infrastructure consisting of IP-based airborne nodes and on board platforms which provide interconnectivity between terrestrial and space networks forming Global Information Grid (GIG). In Joint Aerial Layer Network (JALN) vision, the airborne network augments and extends the existing aerial layer networks and supports operations in permissive, contested as well as anti-access environments against both kinetic and non-kinetic threats. The airborne networks will be critical assets to transport mission critical information and data at the right place and the right time.

Air Force weapons are increasingly vulnerable to cyber intrusion as apertures, data links, embedded digital processing and other components increase the potential attack surface available to adversaries. The AF desires development of defensive cyber technologies that will detect, deter and eliminate hostile cyber intrusions into weapons and weapon networks. Technology proposals are sought which will leverage recent advances in high assurance of software, vulnerability analysis, provable security, or other techniques to develop weapon-centric defensive cyber solutions.

To achieve reliable data and information sharing among highly dynamic network nodes in hostile environments, effective and secure data distribution and sharing technologies are highly desired. Recent analyses suggest a reliable, secure data and information sharing is currently lacking and that the new technologies are necessary to fill the specific capability gaps.

Most commercial solutions for data storage and sharing technologies are not directly applicable to the airborne networks because of their limited capabilities and their unique characteristics. The airborne network consists of highly dynamic airborne nodes with heterogeneous capabilities, often highly specialized, such as ISR, planning, command and control, storage. Node mobility often results in significant network dynamics such as intermittent connectivity which in turn results in continuously changing network topology and changing routes to the information of interest. Moreover, necessary information and data may not be accessible if the information source leaves the network or if the communication links to the node are disrupted. Another deficiency in commercial networks is that the network nodes are not trusted and secured because they can be captured and compromised.

This topic seeks innovative technologies to improve data availability, security and accessibility for the airborne networks. The anticipated solutions should possess the following capabilities: 1) high data availability: data can be recovered when a minimized of network nodes are available; 2) securing data-at-rest: the data stored in network are secured even when a small number of storage nodes are compromised; 3) Adapting to network dynamics: the solutions should accommodate network dynamics to make available the data to users most of the time. The solutions should adapt to network dynamics such as network splitting, merging and node leaving; and 4) low storage and communication overheads. The solutions should incur low communications and storage overhead.

PHASE I: Generate a system design of the data storage and sharing methodologies for airborne networks that can protect data at rest (DAR) and data in transit. Quantify the benefits using analysis and simulations, accounting for practical implementation constraints.

PHASE II: Implement the technology in a hardware environment and demonstrate the gains with actual radio elements. Present a path towards a mature system design. Develop a Technology Transition plan (TTP) for commercialization, government agency use and military applicability.

PHASE III DUAL USE APPLICATIONS: Demonstrate a field-ready data storage and sharing system in relevant environment. Execute TTP.

REFERENCES:

1.  Chairman Joint Chiefs of Staff, "Joint Concept for Command and Control of the Joint Aerial layer Network, " 20 March 2015 (Distribution A--Public Release) (http://www.dtic.mil/doctrine/concepts/joint_concepts/joint_concept_aerial_layer_network.pdf) (see p. 2 and p. 7)

2.  T. Schug, C. Dee, N. Harshman, R. Merrell, Air Force aerial layer networking transformation initiatives, IEEE Military Communications Conference, Nov. 2011

3.  D.H. Webster, "Extending the Ground Force Network: Aerial Layer Networking, 25 Apr 2013, http://www.dtic.mil/dtic/tr/fulltext/u2/a602564.pdf

KEYWORDS: airborne networks, data protection and sharing, data-at-rest. data in transit, DAR, aerial, cloud, networked weapons, weapons cyber security


AF171-040

TITLE: Aerial Cloud Analytics for Strategic and Tactical Warfighting (ACAST)

TECHNOLOGY AREA(S): Information Systems

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 5.4.c.(8) of the solicitation and within the AF Component-specific instructions. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. Please direct questions to the AF SBIR/STTR Contracting Officer, Ms. Gail Nyikon, gail.nyikon@us.af.mil.

OBJECTIVE: Provide responsive information to conventional and strategic warriors at the tactical edge, and to the planners and decision makers governing the conduct of critical air and surface warfare operations. Develop data analytics tools and techniques.

DESCRIPTION: Cloud operations, comprising data ingress and information egress for critical combat operations, involves smart data analytics to provide the most-effective strategic and tactical battle management command control (BMC2) communications. Aerial Cloud Analytics for Strategic and Tactical Warfighting (ACAST) seeks solutions to smartly ingest and analyze and compile data from multiple sources, in multiple forms, and in both small and massive data content, such as imagery, sensor data, and unmanned aerial systems. This must be accomplished quickly and unambiguously to ensure rapid (near-real time) dissemination via egress mechanisms to appropriate combatant, command-control, and intelligence and mission analysts.

In most cases, some data are received by the intended receiver, most-often in native form, such as a Link-16 track, because the receiver is in the battle space arena; however, this information is local and doesn't enjoy the broader dissemination for increased mission effectiveness. Associated information on that track is not presented, nor is sensor data that would typically flow through the ISR center possessing the most-current data related to that track or target. In the commercial world, Google or Amazon, for example, often can predict what user/consumer wants as they begin typing a query. Airborne battle managers aboard BMC2 platforms have huge amounts of data available to them, but lack the data analytics engines to process the data. Even when an experience mission crew member intuitively understands the information to be passed to a tactical or strategic strike aircrew, formatting those instructions may differ from platform to platform. This is a function of the data analytics engine, as well as the ingress and egress engines.

After data ingress, (big) data analytics engines capable of learning and determining end-user format and information needs are not available, even in the larger command centers--certainly not within the aerial battlespaces. DISA and the Services are working to provide analysis of large data sets, first target at the terrestrial IT and planning infrastructure, but current tools are severely lacking for the warrior on the tactical edge.

Certain commercial industries and think tanks have tools constructed to meet their needs. ACAST will begin to move "big data" analysis to the edge by analyzing the sources (ingress of data), the destinations (egress of data), and the methods upon which aerial cloud systems operate on the data.

Finally, the egress engine, using many methods, must distribute the information or forward data to appropriate customers. In all three component "engines" (ingress, data analytics, egress), adaptability, ability to operate with imperfect data sets, and ability to meet information delivery need and schedules is critical. Like the "OODA" loop, data analytics with appropriate analysis rules and not limited by size of data, will ensure the end-user has the information in the form he or she needs it. Likewise, feedback loops from the destination(s) will inform the ingress and data analytics engines as experience is learned and effectiveness is learned.

PHASE I: Provide demonstrable and customizable data analytics approach employing at least 10 different "ingress" input types (delivered at different speeds, formats, waveforms, origins), at least 10 different "egress" outputs (able to deliver at the fastest speed and in the best formats) for the intended receivers). Consider both rule and context-driven approach.

PHASE II: Develop Technology Transition Plan (TTP) for advancement beyond Phase II. Utilizing both unclassified and sensitive but unclassified data, construct or employ available data center resources (considering airborne cloud limitations, throughput, transient nodes, etc.) to demonstrate a 50-node (virtual) environment (include) surface, aerial, data centers, operations centers, and related entities; provide analysis of pros and cons for various configurations. Provide 2 BMC2 applications.

PHASE III DUAL USE APPLICATIONS: Identify early employment of data analytics rules and functions. Integrate with appropriate civil, government or military, or commercial data analytics systems.

REFERENCES:

1.  Big Data Working Group. "Big data analytics for security intelligence.: Cloud Security Alliance (2013)

2.  Dittrich, Jens, and Jorge-Arnulfo QuianA-Ruiz. "Efficient big data processing Hadoop MapReduce." Proceedings of the VLDB Endowment 5.12 (2012): 2014-2015

3.  Wu, Xindong, et at. "Data mining with big data." Knowledge and Data Engineering, IEEE Transactions on 26.1 (2014): 97-107.

4.  Alvaro A Cardenas, Pratyusa K. Manadhata, Sreeranga P. Rajan, "Big Data Analytics for Security," IEEE Security & Privacy, vol. 11, no. 6, pp. 74-76, Nov.-Dec. 2013, doi:10.1109/MSP.2013.138.

5.  CSAF, "USAF Combat Cloud Operating Concept," 9 Mar 2016.

KEYWORDS: big data, cloud, aerial cloud, combat cloud, airborne, tactical cloud, fusion engine, fusion, analytics, data analytics, cloud security, TCRI,ISR Combat Cloud, data analytics, Tactical Cloud Reference Implementation.


AF171-041

TITLE: Aerial Cloud Computing Technologies (ACCT)

TECHNOLOGY AREA(S): Information Systems

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 5.4.c.(8) of the solicitation and within the AF Component-specific instructions. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. Please direct questions to the AF SBIR/STTR Contracting Officer, Ms. Gail Nyikon, gail.nyikon@us.af.mil.

OBJECTIVE: Develop technologies to enable aerial tactical cloud capable of in-mission processing and storage of large data using computing resources distributed across multiple aerial platforms and surface platforms (e.g., ships and ground vehicles)

DESCRIPTION: Manned and unmanned aircraft associated with a mission package will contain a myriad of sensors of various kinds. (e.g., video cameras, RF sensors gathering electronic intelligence (ELINT)). In addition to their primary use as real-time ISR feeds, the data collected by these sensors could be fed to analytics tools for generating valuable activity based intelligence (ABI). Such automated and continuous analysis of data could, for instance, yield patterns of behavior of the red forces enabling blue force units to shape and re-shape their tactics rapidly to ensure mission success.

Traditionally, the analytics tools reside at a facility located in the rear-echelons hundreds or thousands of miles from the forward data collection points. The volume of the collected sensor data that will need to be transported from the tactical edge to such a facility could be in the order of hundreds of gigabits per second if one were to just consider wide area motion imagery (WAMI) and RF data alone. These data rates are well beyond what can be supported by BLOS reach-back links now or in the foreseeable future. Hence, data analytics must be performed on computing platforms on the tactical edge of the aerial battlefield network. What is needed, therefore, is a cloud computing environment which automatically marshals and orchestrates the existing computing resources embedded within the forward deployed aerial platforms (and potentially surface platforms) to meet the needs of data analytics applications on an on-demand basis.

Aerial Cloud Computing Technologies (ACCT)- enabled capabilities of interest to the Air Force include:
1. A mission-configurable, heterogeneous, intra-aircraft computing cluster (i.e., aircraft-embedded data center) shared by multiple concurrently executing data analytic applications belonging to different security domains (e.g., UNCLASSIFIED, CLASSIFIED). The compute cluster must be elastic, i.e., be capable of being reconfigured on demand during a mission to accommodate changes in the application mix in a agile fashion.
2. Self-forming, self-healing inter-aircraft cloud computing ensemble where processing resources may dynamically join and leave the aerial network. This ad hoc aerial cloud must (1) enable the sharing of information across different aircraft; (2) marshal the compute and storage resources distributed across multiple aircraft to execute data analytics applications belonging to different security domains.
3. Mission-oriented cloud manager for monitoring and controlling the operation of the aerial cloud.

The Air Force desires open (non-proprietary) technologies for an agile aerial tactical cloud. Specifically excluded are proprietary protocols, interfaces and other solution artifacts that may inhibit a multi-vender marketplace for ACCT products. Furthermore, information assurance and cyber security requirements for tactical environments must be addressed by any proposed ACCT solution.

PHASE I: Develop the detailed design of an Aerial Cloud Computing Technologies (ACCT) product and demonstrate its implementation feasibility through a proof-of-concept prototype.

PHASE II: Develop a TRL 6 implementation of the ACCT product along with a transition plan for fielding and commercialization.

PHASE III DUAL USE APPLICATIONS: Insert ACCT product within Air Force programs such as Long-Range Strike Bomber (LRS-B), Joint STARS Recapitalization, AWACS modernization, Joint Aerial Layer Network (JALN), and Combat Cloud (CC).

REFERENCES:

1. DoD Cloud Way Forward,http://iase.disa.mil/Documents/dodciomemo_w-attachment_cloudwayforwardreport-20141106.pdf.

2. CJCS General Martin Dempsey, USA, "Joint Concept for Command and Control of the Joint Aerial Layer Network," 15 March 2015) Distribution A-Public Release).

KEYWORDS: tactical cloud, aerial layer network, cloud computing, ad hoc networks, domain separation, multiple security levels, combat cloud, tactical cloud reference implementation, TCRI


AF171-042

TITLE: Big Data Cyber Analytics

TECHNOLOGY AREA(S): Information Systems

OBJECTIVE: Develop log-based Big Data cyber analytics that reveal anomalous behaviors in networks.

DESCRIPTION: Today's networks are vulnerable to a myriad of external and internal threats. Conventional network sensors like Firewalls and Intrusion Protection Systems (IPS) are insufficient for detecting low-and-slow attack behaviors and preventing exploitation. New automated non-signature based detection approaches are needed that can reveal anomalous behaviors from huge volumes of network sensor log data.

The Defense Information Services Agency (DISA) is developing a Joint Big Data Platform (BDP) based on Hadoop technologies with the intention of collecting, ingesting, storing, processing, and querying huge volumes of network sensor logs. The BDP is expected to be a common platform that the individual DoD services develop advanced analytics upon. A wide and evolving set of analytics are expected to be developed to support a diverse set of use-cases across intel, network operations, defense, and offensive organizations.

Cyber analytics is a rich research area that promises to provide meaningful and actionable knowledge from log data produced by a variety of devices including web proxies, firewalls, IPSs directory servers, and end hosts. This solicitation requests the design and development of Big Data analytics that reveal anomalous behaviors in networks. These anomalous behaviors include, but are not limited to: data exfiltration, lateral movement, exploitation, attacker command and control, credential compromise, denial or degradation of services, and infrastructure performance changes.

Though the initial commercialization is toward DISA the contractor must also show, through specific examples that the analytic can be adapted to non-military industry.

PHASE I: Develop analytic to operate on a Big Data cluster to uncover one or more anomalous behaviors. Identify log messages and fields required for the analytic, and the specific output created. Demonstrate operation of the analytic and results produced. Deliverables include a plan for migrating and testing analytic on DISA's Joint Big Data Platform and identify existing AF log sources to be used. The contractor must show that the performance of the analytic should be able to handle initial data clusters of a billion logs with scaling toward a trillion logs.

PHASE II: Migrate the previously developed to work on top of a DISA BDP cluster. Develop a test harness to produce > 100TB of representative AF log data and ingest the log data into the BDP cluster. Demonstrate the operation of the analytic at scale on the BDP cluster. Required Phase II Deliverables include a test report showing effectiveness of the analytic in terms of probability of false positives and false negatives.


Yüklə 1,01 Mb.

Dostları ilə paylaş:
1   ...   6   7   8   9   10   11   12   13   ...   30




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin