PRODIGAL (computer system)
Establishment | 2011 |
---|---|
Sponsor | DARPA |
Value | $9 million |
Goal | Rapidly data mine large sets to discover anomalies |
PRODIGAL (proactive discovery of insider threats using graph analysis and learning) is a computer system for predicting anomalous behavior among humans, by data mining network traffic such as emails, text messages and server log entries.[1] It is part of DARPA's Anomaly Detection at Multiple Scales (ADAMS) project.[2] The initial schedule is for two years and the budget $9 million.[3]
It uses graph theory, machine learning, statistical anomaly detection, and high-performance computing to scan larger sets of data more quickly than in past systems. The amount of data analyzed is in the range of terabytes per day.[3] The targets of the analysis are employees within the government or defense contracting organizations; specific examples of behavior the system is intended to detect include the actions of Nidal Malik Hasan and WikiLeaks source Chelsea Manning.[1] Commercial applications may include finance.[1] The results of the analysis, the five most serious threats per day, go to agents, analysts, and operators working in counterintelligence.[1][3][4]
Primary participants
- Georgia Institute of Technology College of Computing
- Georgia Tech Research Institute
- Defense Advanced Research Projects Agency
- Army Research Office
- Science Applications International Corporation
- Oregon State University
- University of Massachusetts Amherst
- Carnegie Mellon University
See also
- Cyber Insider Threat
- Einstein (US-CERT program)
- Threat (computer)
- Intrusion detection
- ECHELON, Thinthread, Trailblazer, Turbulence (NSA programs)
- Fusion center, Investigative Data Warehouse (FBI)
References
- ↑ 1.0 1.1 1.2 1.3 "Video Interview: DARPA's ADAMS Project Taps Big Data to Find the Breaking Bad". Inside HPC. November 29, 2011. http://insidehpc.com/2011/11/29/video-interview-darpas-adams-project-taps-big-data-to-find-the-breaking-bad/. Retrieved 2011-12-05.
- ↑ Brandon, John (December 3, 2011). "Could the U.S. Government Start Reading Your Emails?". Fox News. http://www.foxnews.com/scitech/2011/12/03/could-us-government-start-reading-your-emails/. Retrieved 2011-12-06.
- ↑ 3.0 3.1 3.2 "Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets". Georgia Institute of Technology. November 10, 2011. http://www.gatech.edu/newsroom/release.html?nid=72599. Retrieved 2011-12-06.
- ↑ Storm, Darlene (December 6, 2011). "Sifting through petabytes: PRODIGAL monitoring for lone wolf insider threats". Computer World. http://blogs.computerworld.com/19382/sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats. Retrieved 2011-12-06.