SAP Ariba system maintenance

SAP Ariba will be unavailable for scheduled maintenance at the times listed below. We apologize for any inconvenience.

  • Saturday, November 23 from 7:00 pm until 11:00 pm (EST) 

Spot The Hack: Intrusion detection systems for avionics networks and bus technologies

Solicitation number W7714-196962/013/A

Publication date

Closing date and time 2019/10/24 14:00 EDT

Last amendment date


    Description

    IMPORTANT

    Requests to open an epost Connect conversation must be sent to:
    DND.IDEaS-IDEeS.MDN@forces.gc.ca

    --------------------------------------------------------

    INTRODUCTION

    This Challenge notice is issued under the Innovation for Defence Excellence and Security (IDEaS) Program Call for Proposals (CFP) Call 003 (W7714-196962).

    Please refer to the main solicitation documents and amendments which contain the process for submitting a proposal.

    --------------------------------------------------------

    HOW TO APPLY

    Step 1:
    Read the Challenge notice in its entirety.

    Step 2:
    Read the Call for Proposals (CFP) and any associated attachments.

    Step 3:
    Download and complete Attachment 1 – Electronic Proposal Submission Form, found below. If you have technical difficulties downloading the form, please see Attachment 2 – Important Information below.

    Step 4:
    Follow the submission instructions listed in Part 2 – Bidder Instructions of the CFP. Please allow sufficient time to register and submit the completed form before the Challenge tender notice closing date.

    Requests to open an epost Connect Conversation are to be sent to DND.IDEaS-IDEeS.MDN@forces.gc.ca with the bid solicitation number at least five business days prior to the closing date of the Challenge tender notice. Follow the instructions that will be provided by email and submit your Electronic Proposal Submission Form by using the opened epost Connect Conversation.

    Important: To avoid last minute technical difficulties that could delay your submission, ensure that Part 2 – Bidder Instructions and Part 3 – Proposal Preparation Instructions are followed carefully. Late submissions will not be accepted.

    --------------------------------------------------------

    MAXIMUM FUNDING AND PERFORMANCE PERIOD

    Multiple contracts could result from this Challenge.

    The individual maximum contract funding available under Competitive Projects - Component 1a is up to $200,000 CAD (excluding applicable taxes) for a maximum performance period of up to 6 months.

    This disclosure is made in good faith and does not commit Canada to contract for the total approximate funding.

    --------------------------------------------------------

    CHALLENGE DETAILS

    Challenge Title

    Spot The Hack: Intrusion detection systems for avionics networks and bus technologies

    Challenge Statement

    The Department of National Defence and the Canadian Armed Forces (DND/CAF) are seeking innovative solutions for an effective Intrusion Detection Systems (IDS) for avionics network and bus technologies used within the aerospace and space industry.

    Background and Context

    Operational Technologies (OT) and Platform Technologies (PT) are used to control operations in manufacturing, transportation, utilities, defence networks, etc. Historically, these systems relied on closed proprietary protocols and software, and were managed and monitored by humans, thereby presenting a minimal attack surface from the outside. System/protocol developers were not concerned about security due to the rudimentary cyber security field and supposed air gap, but nowadays, legacy OT/PT systems are increasingly integrated with newer Information Technology (IT) systems. This connectivity improves efficiency in processes, transmission, and data storage allowing for remote monitoring and control of physical devices, but it also exposes these legacy systems to a wider range of threat scenarios which were never taken into account by their developers.

    Military Standard (MIL-STD) 1553 bus is used in the majority of Royal Canadian Air Force (RCAF) aircraft to share avionics information, such as altitude, position and speed, throughout a network of remote terminals. Recent research has identified possible attack vectors for corrupting/modifying data on the MIL-STD-1553 bus as well as their likely consequences1.

    A sound “defense-in-depth” strategy for air platforms includes avionics bus monitoring as a way of detecting malicious cyber events. Platform technologies such as MIL-STD-1553 lack the richness and maturity of the IDS solutions available for traditional IT infrastructures. One of the main challenges with defending military platform technologies is that the cyber weapons that must be defended against do not have their signatures in openly available databases, as is usually the case for traditional IDS used within IT. The ability to detect zero-days via bus monitoring tips the scale towards a noisier anomaly-based IDS solution.

    Avionics systems are real-time systems that operate in very predictable ways. Although there may be a variety of modes of operation, the number of modes is finite and well-defined. MIL-STD-1553 is a protocol designed to support real-time communications through the implementation of a schedule where every communication is initiated by a bus controller, orchestrating all communications designed to meet all the time constraints of the data exchange for the systems it supports. This predictability greatly increases the potential precision of an anomaly-based IDS in that a system could build a very precise model of normal operation in order to recognize abnormal activities.

    Desired Outcomes

    Innovative research, tools, technologies and/or processes are sought that address, but are not limited to the following:

    • Anomaly-based IDS tailored to the MIL-STD-1553 protocol;
    • The ability to monitor and analyze bus traffic while it is in operation and process the information faster than it is produced by the bus recorders;
    • Solutions that can be customized to suit other similar aerospace systems or protocols;
    • Ability to minimize the false positive rates or provide a means to reliably prioritize the detected anomalies;
    • Information that can help guide analysts when responding to anomalous activity.

    1 O. Stan, Y. Elovici, A. Shabtai, G. Shugol, R. Tikochinski, and S. Kur. “Protecting Military Avionics Platforms from Attacks on MIL-STD-1553 Communication Bus.” arXiv:1707.05032v1 [cs.CR]. 17 Jul, 2017

    --------------------------------------------------------

    ENQUIRIES

    All Challenge-related enquiries must be submitted in writing to:

    TPSGC.PAIDEES-APIDEAS.PWGSC@tpsgc-pwgsc.gc.ca

    Enquiries must be submitted no later than 10 calendar days before the Challenge notice closing date. Enquiries received after that time may not be answered.

    For more information about the IDEaS program, Bidders can visit the IDEaS website.

    Contract duration

    Refer to the description above for full details.

    Trade agreements

    • Canadian Free Trade Agreement (CFTA)

    Partner with another business

    The functionality to add your company name to the list of interested businesses is temporarily unavailable.

    This list does not replace or affect the tendering procedures for this procurement process. Businesses are still required to respond to bid solicitations, and to compete based on the set criteria. For more information please read the Terms of use.

    Contact information

    Contracting organization

    Organization
    Public Works and Government Services Canada
    Address
    11 Laurier St, Phase III, Place du Portage
    Gatineau, Quebec, K1A 0S5
    Canada
    Contracting authority
    L'équipe IDEeS du TPSGC / PWGSC IDEaS team
    Email
    tpsgc.paidees-apideas.pwgsc@tpsgc-pwgsc.gc.ca
    Address
    10 rue Wellington
    Gatineau, QC, K1A 0H4
    CA

    Buying organization(s)

    Organization
    Public Works and Government Services Canada
    Address
    11 Laurier St, Phase III, Place du Portage
    Gatineau, Quebec, K1A 0S5
    Canada
    Bidding details

    Full details regarding this tender opportunity are available in the documents below. Click on the document name to download the file. Contact the contracting officer if you have any questions regarding these documents.

    Access the Getting started page for details on how to bid, and more.

    Eligibility and terms and conditions

    Government of Canada tender and awards notices, solicitation documents, and other attachments are fully accessible and available free of charge and without having to register on CanadaBuys.

    Information may be available on another source prior to being available on CanadaBuys. You may have received this information through a third-party distributor. The Government of Canada is not responsible for any tender notices and/or related documents and attachments not accessed directly from CanadaBuys.canada.ca.

    Government of Canada tender or award notices carry an OpenGovernment License - Canada that governs its use. Related solicitation documents and/or tender attachments are copyright protected. Please refer to our terms and conditions page for more information.

    Summary information

    Notice type
    Request for Proposal
    Language(s)
    English, French
    Region(s) of delivery
    Canada
    Region of opportunity
    Canada
    Procurement method
    Competitive – Open Bidding

    Support for small and medium businesses

    If you have questions about this tender opportunity, please contact the contracting officer, whose information is found in the Contact information tab. 

    Refer to our Support page if you need help or have questions about the government procurement process, including how to bid or how to register in SAP Ariba. You can also contact Procurement Assistance Canada, which has offices across Canada.

     

    Date modified: