Search Contract Opportunities

AI/ML-Generated Decoy Networks

ID: AF254-0801 • Type: SBIR / STTR Topic

Description

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Integrated Sensing and Cyber The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws. OBJECTIVE: Provide a software application that generates decoy networks that are 1) efficient to employ (maximum automation, minimum manual inputs) and 2) realistic enough to deceive a sophisticated state-sponsored hacker. It is expected that recent advancements in machine learning and artificial intelligence will support this objective. DESCRIPTION: Defensive Cyber Operations (DCO) across the Air Force and DoD face a daily onslaught of state-sponsored expert hackers. Due to the quantity and sophistication of these adversaries, it is insufficient to rely solely on firewalls, anomaly/intrusion detection software, and human monitors. An additional method of defense is to create decoy networks, often referred to as honey pots or honey nets (in the case of multiple connected decoy networks). These decoys are intended to lure adversaries into wasting time and exposing their tactics, techniques, and procedures (TTPs) in a simulated environment where they can do no harm. While promising, past attempts to create decoy networks have been overly burdensome to create and largely ineffective against expert hackers because they are too easy to identify as fake. Air Force CyberWorx, 16th Air Force, and Air Combat Command are highly interested in novel approaches to create more realistic digital twin decoy networks that are dynamic. These networks need to accurately simulate users, infrastructure, data, and data flows. It is believed that emerging work in artificial intelligence, machine learning, expert systems, virtualization, and block chain technologies could dramatically improve realism and assist in counter measures. Proposed solutions could be trained on live networks to mirror characteristics and behaviors then apply algorithms to create the decoy and dynamically change like real networks would and adapt to threat behavior. Additional training of the algorithms could be provided by expert white hat cyber operators to improve fidelity. The system should detect, distract, and track the adversary and report activity to authorized defensive cyber operators. Decoy modifications or actions against the threat in real time should be selectable as automated, semi-automated, and/or manual. PHASE I: Provide a feasibility study that evaluates potential AI/ML or other similar methodologies and recommend an approach to implement these methodologies in a user-friendly software application that allows defensive cyber operators to generate and manage realistic, dynamic decoy networks and track hacker activity in real-time without the hacker knowing they are being watched or manipulated. PHASE II: Provide a prototype software application that allows defensive cyber operators to generate and manage realistic, dynamic decoy networks and track hacker activity in real-time without the hacker knowing they are being watched or manipulated. Demonstrate the prototype in a realistic development "sand box" environment (TRL 6 maturity). PHASE III DUAL USE APPLICATIONS: Advance from a TRL 6 lab tested prototype to a TRL 9 product in an operational environment. This will require a Risk Management Framework and Authority to Operate approval with assistance from Air Force CyberWorx and the 67th Cyberspace Wing. Once proven effective, this technology is expected to have applications throughout DoD, USG, and commercial markets. REFERENCES: 1. Sun, Kim. "Design and Implementation of Decoy Enhanced Dynamic Virtualized Networks." Final Technical Report. Grant #N00014-15-1-2396. 12/12/2016; 2. Dougherty, Jeffrey T. "Evasion of Honeypot Detection Mechanisms Through Improved Interactivity of ICS-SCADA Systems." Technical Report. Naval Post Graduate School. Sept 2020; 3. Chong, Wai H. and Koh, Chong K. "Learning Cyberattack Patterns with Active Honeypots." Technical Report. Naval Post Graduate School. 8/1/2018. KEYWORDS: Honey pot; honey net; decoy networks; artificial intelligence; machine learning; AI/ML

Overview

Response Deadline
June 25, 2025 Due in 38 Days
Posted
May 12, 2025
Open
May 12, 2025
Set Aside
Small Business (SBA)
Place of Performance
Not Provided
Source
Alt Source

Program
SBIR Phase I / II
Structure
Contract
Phase Detail
Phase I: Establish the technical merit, feasibility, and commercial potential of the proposed R/R&D efforts and determine the quality of performance of the small business awardee organization.
Phase II: Continue the R/R&D efforts initiated in Phase I. Funding is based on the results achieved in Phase I and the scientific and technical merit and commercial potential of the project proposed in Phase II. Typically, only Phase I awardees are eligible for a Phase II award
Duration
6 Months - 1 Year
Size Limit
500 Employees
On 5/12/25 Department of the Air Force issued SBIR / STTR Topic AF254-0801 for AI/ML-Generated Decoy Networks due 6/25/25.

Documents

Posted documents for SBIR / STTR Topic AF254-0801

Question & Answer

Contract Awards

Prime contracts awarded through SBIR / STTR Topic AF254-0801

Incumbent or Similar Awards

Potential Bidders and Partners

Awardees that have won contracts similar to SBIR / STTR Topic AF254-0801

Similar Active Opportunities

Open contract opportunities similar to SBIR / STTR Topic AF254-0801