Defense Advanced Research Projects AgencyTagged Content List

Cyber

Relating to digital systems and information

Showing 14 results for Cyber + Analytics RSS
01/01/2014
DARPA rolled out its Memex program to move forward the state of the art in content indexing and web searching on the Internet. Over the next few years, the Memex program yielded new tools that enabled quick and thorough organization of a subset of the Internet, leading to more comprehensive and relevant domain-specific indexing of web content and domain-specific search capabilities. Memex quickly proved its value in efforts to counter human trafficking.
01/22/2013
The Department of Defense (DoD) maintains one of the largest computer networks in the world. The network follows DoD personnel across the globe collecting, transferring and processing information in forms as diverse as data warehouses, in-the-field mobile devices and mission computers on board F-18’s. This network is also constantly changing in size and shape as new missions are undertaken and new technology is deployed. In military terms, that means the cyber terrain of the DoD network is constantly shifting.
December 14, 2015,
DARPA Conference Center
The Defense Advanced Research Projects Agency (DARPA) Information Innovation Office (I2O) is sponsoring a Proposers Day to provide information to potential proposers on the objectives of the anticipated Rapid Attack Detection, Isolation and Characterization (RADICS) Broad Agency Announcement (BAA). The Proposers Day will be held on Monday, December 14, 2015, from 9:00 AM to 11:30 AM (ET) at the DARPA Conference Center, located at 675 N. Randolph Street, Arlington, Virginia 22203. For more information, visit FedBizOpps.gov.
To be effective, Department of Defense (DoD) cybersecurity solutions require rapid development times. The shelf life of systems and capabilities is sometimes measured in days. Thus, to a greater degree than in other areas of defense, cybersecurity solutions require that DoD develops the ability to build quickly, at scale and over a broad range of capabilities.
Networks within the United States and abroad face increasingly broad-spectrum cyber threats from numerous actors and novel attack vectors. Malicious activity also crosscuts organizational boundaries, as nefarious actors use networks with less protection to pivot into networks containing key assets. Detection of these threats requires adjustments to network and host sensors at machine speed. Additionally, the data required to detect these threats may be distributed across devices and networks. In all of these cases, the threat actors are using technology to perpetrate their attacks and hide their activities and movement, both physical and virtual, inside DoD, commercial, and Internet Access Provider (IAP) networks.