About the Competition
- Peace-a-Thon will be hosted online globally
- The competition will be hosted in two phases–Ideathon and Finale
- Participants can register as individuals or as a team of three members
- Participants will be required to develop a working solution to the given problem statement
Peace-a-Thon 3.0 will be conducted in the following rounds;
1- Participants can register themselves by visiting the official Global CyberPeace Challenge 3 (www.cyberchallenge.net)
2- A set of problem statements will be published on the website, participants will be selecting any of them as challenge to develop the solution
3- Participants need to submit their idea and technology to be used at the time of registration
4- Shortlisting of the participants/Teams will be done on the basis of the ideas submitted
5- One team/Participant can submit only one idea
1- Shortlisted participant will be called for the Grand Finale of the Global CyberPeace Challenge 3
2- The grand finale of Peace-a-Thon will be hosted on Zoom
3- Link to join the competition will be mailed to the participants one hour prior to the start of competition
4- The grand finale will be a 36-hour long event, participants are requested to be online for the whole event
5- Multiple sessions/workshops will be organized for the participants during the grand finale
1- Registration/ Ideathon
- Participants can register themselves by visiting the official website of Global Cyber Challenge 2020 (www.cyberchallenge.net)
- A set of problem statements will be published on the website, participants will be selecting any of them as challenge to develop the solution
- Participants need to submit their idea and technology to be used at the time of registration
- Shortlisting of the participants/Teams will be done on the basis of the ideas submitted
- One team/Participant can submit only one idea
2- Grand Finale
- Shortlisted participants will be called for the Grand Finale of the Global CyberPeace Challenge 2.0
- The grand finale of Peace-a-Thon will be hosted on Zoom
- Link to join the competition will be mailed to the participants one hour prior to the start of competition
- The grand finale will be a 48-hour long event, participants are requested to be online for the whole event
- Multiple sessions will be organized for the participants during the grand finale
Problem Statements :
DNS abuse and Solution
Objective: To provide a secure DNS Infrastructure to the community and monitor the real time DNS based threats.
Proposed work: The Domain Name System (DNS) is like a phonebook of the entire internet. Each time a human wants to open a website using a domain name like www.cyberpeace.org browser interacts with internet protocol and DNS translates that domain name to its respective IP address so that web browsers can load the web pages.
A standard DNS query that is required for most of the web traffic, creates opportunities for exploitation of DNS like DNS hijacking, Man in the middle attack, DNS cache poisoning, DNS Tunneling etc.
A solution is expected to deploy Public DNS infrastructure across the World with anycast routing, keeping the security in first priority in mind to mitigate the DNS threats and DNS based malicious activities. Some key feature should be addressed–
● DNSSEC enabled — DNSSEC is a powerful protocol that protects the client from quack sites.
● Blocks the sites that are believed to be created for malicious or phishing purposes.
● Minimizes the leakage of excessive information about the DNS query.
● Support the anycast routing that mitigates the DoS attacks on DNS.
● Reduces the Round trip delay to maximize the DNS performance.
● An SIEM enabled feature to monitor the real time threats that a DNS infrastructure faces.
Fighting Cyber Violence
There’s plenty of different opportunities to help:
— Suggest new ways of securing accounts that are not susceptible to an intimate partner who becomes abusive, as many survivors need to lock down multiple accounts quite rapidly and sometimes passwords, and 2FA is intercepted.
— Work on new ways of identifying and alerting that survivor’s location is tracked via the mobile device or any other tracker.
— Design an app or piece of technology that helps survivors scan a room / vehicle for hidden devices (cameras and listening devices, location trackers).
— Design an app or piece of technology that can help support victims to identity where intimate images have been circulated online. One may use reverse Google search if they have an image but often the survivor doesn’t. It is important to make the process of findings images online easier and less traumatic for survivors and a way to remove the image and report it automatically (and identify, who uploaded the image, if possible).
– Fighting Cyber Frauds
– Fighting the spread of CSAM
– Fighting Ransomware