Army uses proxy cache engines to foil hackers

Army uses proxy cache engines to foil hackers

By Bill Murray

GCN Staff

The Army is using proxy cache engines to protect the nearly 1,000 Web sites the service maintains at offices and on bases within the continental United States.

Using the cache engines, the service will mirror each of its sites. The proxy engines will replenish the sites with data from original production sites continually, said Phillip J. Loranger, operations officer for information assurance in the Directorate of Information Systems for Command, Control, Communications and computers (DISC4).

The Web sites will be replenished on such short cycles that a hacked site will be replaced with new data within milliseconds so no one will know the difference, he said.

The program will reduce Web site intrusion and unauthorized use, Loranger said.

Army officials have been battling to protect Web sites from hackers. In June, a hacker altered the home page of the service's main Web site, at www.army.mil. The damaged site stayed online for about 13 hours [GCN, July 5, Page 45].

Army DISC4 officials are using several proxy cache engine products, Loranger said, but he would not list specific vendors. 'We're going to put some of them across the board. We'll see which ones work,' he said.

If the program goes well, DISC4 officials will expand it to Army facilities abroad, Loranger said.

inside gcn

  • Congressman sees broader role for DHS in state and local cyber efforts

    Automating the ATO

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above