Anomaly Detection at Multiple Scales

Last updated
Anomaly Detection at Multiple Scales
Establishment2011
Sponsor DARPA
Value$35 million
GoalDetect insider threats in defense and government networks
Website www.darpa.mil

Anomaly Detection at Multiple Scales, or ADAMS, was a $35 million DARPA project designed to identify patterns and anomalies in very large data sets. It is under DARPA's Information Innovation office and began in 2011 [1] [2] [3] [4] and ended in August 2014 [5]

The project was intended to detect and prevent insider threats such as "a soldier in good mental health becoming homicidal or suicidal", an "innocent insider becoming malicious", or "a government employee [who] abuses access privileges to share classified information". [2] [6] Specific cases mentioned are Nadal Malik Hasan and WikiLeaks source Chelsea Manning. [7] Commercial applications may include finance. [7] The intended recipients of the system output are operators in the counterintelligence agencies. [2] [6]

The Proactive Discovery of Insider Threats Using Graph Analysis and Learning was part of the ADAMS project. [6] [8] The Georgia Tech team includes noted high-performance computing researcher David Bader (computer scientist). [9]

See also

Related Research Articles

<span class="mw-page-title-main">DARPA</span> Agency of the U.S. Department of Defense

The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military.

An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.

<span class="mw-page-title-main">Information Awareness Office</span> DARPA division overseeing the "Total Information Awareness" program

The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security by achieving "Total Information Awareness" (TIA).

<span class="mw-page-title-main">Total Information Awareness</span> US mass detection program

Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness.

<span class="mw-page-title-main">Honeypot (computing)</span> Computer security mechanism

In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of data that appears to be a legitimate part of the site which contains information or resources of value to attackers. It is actually isolated, monitored, and capable of blocking or analyzing the attackers. This is similar to police sting operations, colloquially known as "baiting" a suspect.

An anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous. The classification is based on heuristics or rules, rather than patterns or signatures, and attempts to detect any type of misuse that falls out of normal system operation. This is as opposed to signature-based systems, which can only detect attacks for which a signature has previously been created.

<span class="mw-page-title-main">Dorothy E. Denning</span> American information security researcher

Dorothy Elizabeth Denning is a US-American information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four books and over 200 articles. Inducted into the National Cyber Security Hall of Fame in 2012, she is now Emeritus Distinguished Professor of Defense Analysis, Naval Postgraduate School.

<span class="mw-page-title-main">Peiter Zatko</span> American computer security expert

Peiter C. Zatko, better known as Mudge, is an American network security expert, open source programmer, writer, and hacker. He was the most prominent member of the high-profile hacker think tank the L0pht as well as the computer and culture hacking cooperative the Cult of the Dead Cow.

<span class="mw-page-title-main">David Bader (computer scientist)</span> American computer scientist

David A. Bader is a Distinguished Professor and Director of the Institute for Data Science at the New Jersey Institute of Technology. Previously, he served as the Chair of the Georgia Institute of Technology School of Computational Science & Engineering, where he was also a founding professor, and the executive director of High-Performance Computing at the Georgia Tech College of Computing. In 2007, he was named the first director of the Sony Toshiba IBM Center of Competence for the Cell Processor at Georgia Tech.

<span class="mw-page-title-main">Georgia Institute of Technology College of Computing</span>

The College of Computing is a college of the Georgia Institute of Technology, a public research university in Atlanta, Georgia. It is divided into four schools: the School of Computer Science, the School of Interactive Computing, the School of Computational Science & Engineering, and the School of Cybersecurity and Privacy. The College of Computing's programs are consistently ranked among the top 10 computing programs in the nation. In 2022, U.S. News & World Report ranked the Computer Science graduate program #6 in the U.S. In 2016, Times Higher Education and the Wall Street Journal ranked the College #5 in the world.

<span class="mw-page-title-main">Anomaly detection</span> Approach in data analysis

In data analysis, anomaly detection is generally understood to be the identification of rare items, events or observations which deviate significantly from the majority of the data and do not conform to a well defined notion of normal behaviour. Such examples may arouse suspicions of being generated by a different mechanism, or appear inconsistent with the remainder of that set of data.

Data loss prevention (DLP) software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.

Log management (LM) comprises an approach to dealing with large volumes of computer-generated log messages (also known as audit records, audit trails, agement generally covers:

Network behavior anomaly detection (NBAD) is a security technique that provides network security threat detection. It is a complementary technology to systems that detect security threats based on packet signatures.

<span class="mw-page-title-main">Stephen E. Cross</span>

Stephen Edward Cross is the executive vice president for research (EVPR) at the Georgia Institute of Technology (Georgia Tech), a position to which he was appointed in 2010. As EVPR, Cross coordinates research efforts among Georgia Tech's colleges, research units and faculty; and provides central administration for all research, economic development and related support units at Georgia Tech. This includes direct oversight of Georgia Tech's interdisciplinary research institutes, the Georgia Tech Research Institute (GTRI), the Enterprise Innovation Institute (EI2) and the Georgia Tech Research Corporation (GTRC).

PRODIGAL is a computer system for predicting anomalous behavior among humans, by data mining network traffic such as emails, text messages and server log entries. It is part of DARPA's Anomaly Detection at Multiple Scales (ADAMS) project. The initial schedule is for two years and the budget $9 million.

Cyber Insider Threat, or CINDER, is a digital threat method. In 2010, DARPA initiated a program under the same name to develop novel approaches to the detection of activities within military-interest networks that are consistent with the activities of cyber espionage.

Georgios (George) V. Magklaras is a computer scientist working as a Senior Computer Systems Engineer at the Norwegian Meteorological Institute, in Norway. He also co-founded Steelcyber Scientific, an information security based consultancy specialising in digital forensics. He is a high-performance computing engineer and information security researcher. He developed methods in the field of insider IT misuse detection and prediction and digital forensics. He is the author of the LUARM and POFR tools for the Linux Operating System. He has been a strong advocate of Linux, open source tools and the Perl programming language and has given a series of lectures internationally in the fields of intrusion detection systems, digital forensics, bioinformatics, computer programming and systems administration.

<span class="mw-page-title-main">Salvatore J. Stolfo</span> American computer scientist

Salvatore J. Stolfo is an academic and professor of computer science at Columbia University, specializing in computer security.

<span class="mw-page-title-main">Raheem Beyah</span> American computer engineer

Raheem Beyah is an American computer engineer, researcher, and educator. As of January 15, 2021 he is the Dean of the College of Engineering and Southern Company Chair at the Georgia Institute of Technology. Prior to becoming the Dean, he was the vice president for Interdisciplinary Research and the Motorola Foundation Professor and the executive director of Georgia Tech's online masters in cyber security program. Beyah is also the co-founder and chair of industrial security company Fortiphyd Logic, Inc.

References

  1. "ADAMS". DARPA Information Innovation Office. Archived from the original on 2012-01-21. Retrieved 2011-12-05.
  2. 1 2 3 "Anomaly Detection at Multiple Scales (ADAMS) Broad Agency Announcement DARPA-BAA-11-04" (PDF). General Services Administration. 2010-10-22. Archived from the original (PDF) on 2012-04-06. Retrieved 2011-12-05.
  3. Ackerman, Spencer (2010-10-11). "Darpa Starts Sleuthing Out Disloyal Troops". Wired . Retrieved 2011-12-06.
  4. Keyes, Charley (2010-10-27). "Military wants to scan communications to find internal threats". CNN . Retrieved 2011-12-06.
  5. "DARPA ADAMS Project".
  6. 1 2 3 "Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets". Georgia Institute of Technology. 2011-11-10. Retrieved 2011-12-06.
  7. 1 2 "Video Interview: DARPA's ADAMS Project Taps Big Data to Find the Breaking Bad". Inside HPC. 2011-11-29. Retrieved 2011-12-06.
  8. Brandon, John (2011-12-03). "Could the U.S. Government Start Reading Your Emails?". Fox News . Retrieved 2011-12-06.
  9. "Anomaly Detection at Multiple Scales". Georgia Tech College of Computing . Retrieved 2011-12-06.