Anomaly Detection at Multiple Scales, or ADAMS, was a $35 million
DARPA
The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military.
Originally known as the Ad ...
project designed to identify patterns and anomalies in very large data sets. It is under DARPA's
Information Innovation office
The Information Innovation Office (I2O) is one of the seven technical offices within DARPA, an agency of the U.S. Department of Defense that is responsible for the development of advanced technology for national security. I2O was created in 2010 b ...
and began in 2011
and ended in August 2014
The project was intended to detect and prevent insider threats such as "a soldier in good mental health becoming homicidal or
suicidal", an "innocent insider becoming malicious", or "a government employee
who">/nowiki>who/nowiki> abuses access privileges to share classified information". Specific cases mentioned are Nidal Malik Hasan Nidal (in Arabic نضال meaning warrior in Arabic) is a given name in Arabic. It may refer to:
*Mohammad Nidal al-Shaar (born 1956), Syrian politician and government minister
*Abou Nidal, Côte d'Ivoirian singer
*Umm Nidal (1948–2013), Palesti ...
and WikiLeaks
WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
source Chelsea Manning
Chelsea Elizabeth Manning (born Bradley Edward Manning; December 17, 1987) is an American activist and whistleblower. She is a former United States Army soldier who was convicted by court-martial in July 2013 of violations of the Espionage ...
. Commercial applications may include finance. The intended recipients of the system output are operators in the counterintelligence
Counterintelligence is an activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or o ...
agencies.
The Proactive Discovery of Insider Threats Using Graph Analysis and Learning was part of the ADAMS project. The Georgia Tech team includes noted high-performance computing
High-performance computing (HPC) uses supercomputers and computer clusters to solve advanced computation problems.
Overview
HPC integrates systems administration (including network and security knowledge) and parallel programming into a multi ...
researcher David Bader (computer scientist)
David A. Bader (born May 4, 1969) is a Distinguished Professor and Director of the Institute for Data Science at the New Jersey Institute of Technology. Previously, he served as the Chair of the Georgia Institute of Technology School of Computa ...
.
See also
* Cyber Insider Threat
* Einstein (US-CERT program)
EINSTEIN (also known as the EINSTEIN Program) was originally an intrusion detection system that monitors the network gateways of government departments and agencies in the United States for unauthorized traffic. The software was developed by the ...
* Threat (computer)
In computer security, a threat is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.
A threat can be either a negative "intentional" event (i.e. hacking: a ...
* Intrusion detection
An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically rep ...
References
Applied data mining
Computer security
Georgia Tech Research Institute
DARPA projects
{{software-stub