Defense Advanced Research Projects AgencyTagged Content List

Analytics for Data at Massive Scales

Extracting information from large data sets

Showing 13 results for Analytics + Cyber RSS
01/01/2014
DARPA rolled out its Memex program to move forward the state of the art in content indexing and web searching on the Internet. Over the next few years, the Memex program yielded new tools that enabled quick and thorough organization of a subset of the Internet, leading to more comprehensive and relevant domain-specific indexing of web content and domain-specific search capabilities. Memex quickly proved its value in efforts to counter human trafficking.
01/22/2013
The Department of Defense (DoD) maintains one of the largest computer networks in the world. The network follows DoD personnel across the globe collecting, transferring and processing information in forms as diverse as data warehouses, in-the-field mobile devices and mission computers on board F-18’s. This network is also constantly changing in size and shape as new missions are undertaken and new technology is deployed. In military terms, that means the cyber terrain of the DoD network is constantly shifting.
December 14, 2015,
DARPA Conference Center
The Defense Advanced Research Projects Agency (DARPA) Information Innovation Office (I2O) is sponsoring a Proposers Day to provide information to potential proposers on the objectives of the anticipated Rapid Attack Detection, Isolation and Characterization (RADICS) Broad Agency Announcement (BAA). The Proposers Day will be held on Monday, December 14, 2015, from 9:00 AM to 11:30 AM (ET) at the DARPA Conference Center, located at 675 N. Randolph Street, Arlington, Virginia 22203. For more information, visit FedBizOpps.gov.
Networks within the United States and abroad face increasingly broad-spectrum cyber threats from numerous actors and novel attack vectors. Malicious activity also crosscuts organizational boundaries, as nefarious actors use networks with less protection to pivot into networks containing key assets. Detection of these threats requires adjustments to network and host sensors at machine speed. Additionally, the data required to detect these threats may be distributed across devices and networks. In all of these cases, the threat actors are using technology to perpetrate their attacks and hide their activities and movement, both physical and virtual, inside DoD, commercial, and Internet Access Provider (IAP) networks.
The United States military is heavily dependent on networked communication to fulfill its missions. The wide-area network (WAN) infrastructure that supports this communication is vulnerable to a wide range of failures and cyber attacks that can severely impair connectivity and mission effectiveness at critical junctures. Examples include inadvertent or malicious misconfiguration of network devices, hardware and software failures, extended delays in Internet Protocol (IP) route convergence, denial of service (DoS) flooding attacks, and a variety of control-plane and data-plane attacks resulting from malicious code embedded within network devices.