Subnet 61

RedTeam

Innerworks

The RedTeam Subnet accelerates cybersecurity through competitive challenges, focusing on bot detection and adaptive solutions.

VIEW PROFILE

SN61 : RedTeam

SubnetDescriptionCategoryCompany
SN61 : RedTeamCybersecurityAl powered tool
RedTeam

The RedTeam Subnet is a pioneering, decentralised platform created to accelerate progress in cybersecurity through competitive programming challenges. By incentivising developers—referred to as miners—to create and submit solutions to various technical problems, the subnet strives to produce industry-leading cybersecurity tools that can be directly applied to real-world applications.

This subnet offers a unique opportunity for individuals with expertise in bypassing detection mechanisms—skills typically associated with red team and adversarial roles—to use these abilities in a safe and constructive manner. By providing a secure, incentivised environment, the RedTeam Subnet allows these individuals to earn income while helping to shape the world’s leading online security standards.

Initially, the RedTeam Subnet will focus on addressing one of the most pressing issues in cybersecurity: bot detection. As automation continues to advance, human activity has become the minority in online interactions. Existing detection solutions struggle to adapt to the evolving techniques used by adversaries, as they lack a continuously adaptive approach. The RedTeam Subnet’s goal is to reverse this trend by fostering an ecosystem that proactively keeps pace with the latest methods of bypassing detection systems.

By encouraging a wide range of attack vectors from participating miners, the subnet enables detection systems to constantly test and evaluate the resilience of their solutions, identifying areas where they can be bypassed. This delivers immediate value to real-world use cases and active enterprise clients. Through a curated set of challenges that push miners to use cutting-edge adversarial techniques, the subnet aims to develop a comprehensive library of simulated attacks that will help detection models better counteract evolving threats. With its modular design, the subnet ensures continuous evolution in detection and circumvention standards, adapting to new techniques in critical threat areas such as anti-fingerprinting strategies and human behavioural biometrics mimicking.

The RedTeam Subnet introduces a decentralized, competitive platform for cybersecurity innovation, aimed at fostering continuous improvement in security solutions through incentivized programming challenges. This modular subnet architecture enables the addition and removal of cybersecurity challenges, allowing miners (participants who submit solutions) to tackle problems and earn rewards in Bittensor’s native currency, TAO. By scoring and validating solutions through an established point system, the RedTeam Subnet ensures a dynamic, competitive environment that leads to high-quality, innovative solutions for best-in-class cybersecurity.

Key Features and Functionality

Modular and Flexible Structure:

The RedTeam Subnet employs a modular system that allows dynamic addition and removal of programming challenges. This flexibility enables the creation of various competitive environments and ensures that the subnet remains relevant and responsive to evolving cybersecurity demands. The adaptability of the subnet allows for an ever-evolving pool of challenges and rewards, keeping pace with the needs of the cybersecurity landscape.

Incentivized Participation:

Miners are rewarded based on the effectiveness and uniqueness of their solutions. Points are awarded to solutions based on how they outperform previous submissions, ensuring a competitive environment where only the best solutions receive rewards. This incentivizes continuous innovation and improvement, driving the development of cutting-edge cybersecurity solutions.

External Validation and Scoring:

Solutions submitted by miners are tested on secure external servers, which act as sandboxes for validation. These servers score the solutions based on their effectiveness, with points assigned according to how well each new solution surpasses the current best. This ensures that the solutions are rigorously tested and validated before being deemed successful.

Open-sourced Library:

The subnet will create a comprehensive, open-source library of simulated attacks. This library will help equip detection models to better counteract evolving threats. Additionally, the baseline detection capabilities of the challenges proposed will surpass the detection performance of typical commercial products, offering companies an open-source solution that is easy to implement and beneficial for real-world use cases.

Incentive Mechanism at a Glance

The RedTeam Subnet’s incentive mechanism creates a competitive and secure environment where miners earn rewards from a dynamic “emission pool” tied to each challenge. Miners submit encrypted solutions to prevent theft, and the points they earn decrease over time, requiring constant improvement to maintain or increase their reward share. For example, in the Human Mouse Movement Imitation challenge, miners compete to develop scripts that mimic human behavior, earning points based on how well their solution convinces the validator. By rewarding quality, innovation, uniqueness, and continuous improvement, the RedTeam Subnet promotes high-impact advancements in cybersecurity.

Subnet Architecture and Design

Architecture Overview:

The subnet operates on a decentralized, modular architecture designed to facilitate secure and competitive cybersecurity solution development. Programming challenges can be dynamically added or removed based on demand, with the primary focus on cybersecurity. However, the concept of a “challenge” is flexible and can include any problem that can be programmatically tested. The RedTeam Subnet is set to become a new framework for enterprises and individuals to post bounties, enabling rapid solutions with continuously improving results over time.

Roles within the Subnet:

There are three main roles within the subnet:

  • Miners: Anyone can register as a miner and submit solutions to programming challenges. Miners are scored by validators, and based on the scores, they receive rewards in TAO. The competitive dynamic between miners ensures constant improvement and innovation.
  • Validators: Validators are TAO holders who evaluate the solutions submitted by miners. Initially, validators are rewarded based on their current TAO stake and the accuracy of their scoring. Over time, validators may gain additional value through their influence on what challenges should be incentivized, potentially offering programming challenge solutions as a service.
  • Subnet Owners: The subnet owners are responsible for maintaining and developing the subnet. They are rewarded with TAO based on the value validators place on their subnet relative to other subnets.

Incentive Mechanism

The RedTeam Subnet uses a modular structure where programming challenges can be flexibly added or removed, and their reward distribution, called the “emission pool,” can be adjusted. The emission pool refers to the percentage of total emissions allocated to a specific programming challenge. For example, if a challenge has a 10% emission pool, then 10% of miner emissions will go towards rewarding solutions to that challenge.

Miners compete for rewards by submitting encrypted code solutions to programming challenges. After 24 hours, miners release the decryption key, ensuring that solutions cannot be stolen before they are validated. The solutions are scored, and miners are awarded points based on their performance. Different challenges have different criteria for awarding points, such as rewarding points for improvements to existing solutions or for unique and diversified approaches. This continuous scoring system encourages innovation and drives the development of new and better cybersecurity solutions.

Awaiting Data