Invictus: Detection of Unanticipated Anomalies in Evolutionary Environments

Principal Investigator

Roy A. Maxion, Carnegie Mellon University, Computer Science Department (maxion@cs.cmu.edu)

Sponsor

The Defense Advanced Research Projects Agency (DARPA) Information Technology Office (ITO)

Objective

To discover a method for detecting unanticipated, unauthorized intrusions into computer and other systems.

Overview

In a natural environment, biological organisms habituate to what is normal in that environment. As the environment changes (e.g., from summer to fall to winter), the organism learns the characteristics of the new environment from day to day, and adapts its internal representation of normal to match the environment. Unusual, or anomalous, conditions can be recognized when viewed against a normal background. Similarly, in computational environments, "normal" behavior changes from time to time, and computational organisms must learn or adapt to the changes in its environment. Again, against a background of normal behavior, the organism can recognize anomalous conditions. We regard intrusions as anomalous conditions that can be recognized against a background of normal behavior. Our task is to build such a computational organism that will adapt to its locally changing environment, and will recognize anomalous behaviors (e.g., intrusions) against that background. This organism, once constructed, will be tested for type-I and type-II errors using both natural and synthetic data streams. We will build a synthetic environment for the purpose of the latter.

Projects

Cinnamon A synthetic environment to generate realistic system performance data.
Harbinger An inner core of anomaly-detection techniques and algorithms that applies new statistical methods in high-dimensional data analysis to the problem of detecting system anomalies indicating intrusion or other kinds of system compromise.

Summary

Quad Chart
  New Quad Chart