Anomaly Detection At Multiple Scales
   HOME

TheInfoList



OR:

Anomaly Detection at Multiple Scales, or ADAMS, was a $35 million
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adv ...
project designed to identify patterns and anomalies in very large data sets. It is under DARPA's Information Innovation office and began in 2011 and ended in August 2014 The project was intended to detect and prevent insider threats such as "a soldier in good mental health becoming homicidal or suicidal", an "innocent insider becoming malicious", or "a government employee /nowiki>who/nowiki> abuses access privileges to share classified information". Specific cases mentioned are
Nidal Malik Hasan Nidal (in Arabic نضال meaning warrior in Arabic) is a given name in Arabic. It may refer to: *Mohammad Nidal al-Shaar (born 1956), Syrian politician and government minister *Abou Nidal, Côte d'Ivoirian singer *Umm Nidal (1948–2013), Palestin ...
and
WikiLeaks WikiLeaks () is an international Nonprofit organization, non-profit organisation that published news leaks and classified media provided by anonymous Source (journalism), sources. Julian Assange, an Australian Internet activism, Internet acti ...
source
Chelsea Manning Chelsea Elizabeth Manning (born Bradley Edward Manning; December 17, 1987) is an American activist and whistleblower. She is a former United States Army soldier who was convicted by court-martial in July 2013 of violations of the Espionage A ...
. Commercial applications may include finance. The intended recipients of the system output are operators in the
counterintelligence Counterintelligence is an activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or ot ...
agencies. The
Proactive Discovery of Insider Threats Using Graph Analysis and Learning ''The Prodigal'' is a 1955 epic biblical film. The Prodigal, Prodigal or Prodigals may also refer to: Arts, entertainment and media Film and television * ''The Prodigal'' (1931 film), an early talkie film * ''The Prodigal'' (1983 film), directe ...
was part of the ADAMS project. The Georgia Tech team includes noted
high-performance computing High-performance computing (HPC) uses supercomputers and computer clusters to solve advanced computation problems. Overview HPC integrates systems administration (including network and security knowledge) and parallel programming into a mult ...
researcher
David Bader (computer scientist) David A. Bader (born May 4, 1969) is a Distinguished Professor and Director of the Institute for Data Science at the New Jersey Institute of Technology. Previously, he served as the Chair of the Georgia Institute of Technology School of Computa ...
.


See also

*
Cyber Insider Threat Cyber Insider Threat, or CINDER, is a digital threat method. In 2010, DARPA initiated a program under the same name (Cyber Insider Threat (CINDER) Program) to develop novel approaches to the detection of activities within military-interest networks ...
*
Einstein (US-CERT program) EINSTEIN (also known as the EINSTEIN Program) was originally an intrusion detection system that monitors the network gateways of government departments and agencies in the United States for unauthorized traffic. The software was developed by the ...
*
Threat (computer) In computer security, a threat is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application. A threat can be either a negative " intentional" event (i.e. hacking: ...
*
Intrusion detection An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically rep ...


References

Applied data mining Computer security Georgia Tech Research Institute DARPA projects {{software-stub