• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

Homeland Security Draft White Paper 2017

January 13, 2018 By TheNewsTeam

The U.S. Departments of Homeland Security and Commerce are working on a White Paper to be presented to the President later this year on enhancing the resilience of the Internet against Botnets and Distributed Attacks. They released a draft last Friday and are currently inviting comments until February 12, 2018.

The Obama administration initiated the process in May 2011 with an Executive Order, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. That order asked the Homeland Security and Commerce Departments to lead an open process “to identify and promote action” on the steadily increasing threats posed by automated and distributed attacks.

The report also laid out six main themes in identifying the challenges and suggesting opportunities for how to significantly reduce threats from automated, distributed attacks, in particular botnets. The themes are:

  1. Automated, distributed attacks are a global problem.
  2. Effective tools exist, but are not widely used.
  3. Products should be secured during all stages of the lifecycle.
  4. Education and awareness is needed among home and business customers.
  5. Market incentives are misaligned, and should focus more on security than cost savings.
  6. Automated, distributed attacks are an ecosystem-wide challenge, requiring a diverse robust response to their mitigation.

The government draft paper stresses the urgent need for working partnerships across the public and private sectors, and defines five goals and suggested activities “intended to dramatically reduce the threat of automated, distributed attacks and improve the resilience of the ecosystem”.

The five goals are:

Goal 1: Identify a clear pathway toward an adaptable, sustainable, and secure technology marketplace

Goal 2: Promote innovation in the infrastructure for dynamic adaptation to evolving threats

Goal 3: Promote innovation at the edge of the network to prevent, detect, and mitigate bad behavior

Goal 4: Build coalitions between the security, infrastructure, and operational technology communities domestically and around the world

Goal 5: Increase awareness and education across the ecosystem

Following the comments period, the National Institute of Standards and Technology (NIST) will hold a workshop to discuss unresolved comments and next steps for the Report. The final White Paper will be submitted to the President on or before May 11, 2018.

Filed Under: Government, IoT DDoS Tagged With: automated and distributed attacks, botnets, government, Homeland Security, IoT, public-private partnership, US Department of Commerce, US Department of Homeland Security

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.