You are here

DIA: Distributed Information Assurance in Ballistic Missile Defense Systems using Scalable, Distributed Data Mining Technology

Award Information
Agency: Department of Defense
Branch: Missile Defense Agency
Contract: HQ0006-09-C-7023
Agency Tracking Number: B073-039-0654
Amount: $999,985.00
Phase: Phase II
Program: SBIR
Solicitation Topic Code: MDA07-039
Solicitation Number: 2007.3
Timeline
Solicitation Year: 2007
Award Year: 2009
Award Start Date (Proposal Award Date): 2009-07-31
Award End Date (Contract End Date): 2011-07-31
Small Business Information
8840 Stanford Blvd. STE. 1300
Columbia, MD 21045
United States
DUNS: 025443412
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Kakali Sarkar
 Chief Operating Officer
 (410) 290-0146
 kakali@agnik.com
Business Contact
 Hillol Kargupta
Title: President
Phone: (443) 538-6624
Email: hillol@agnik.com
Research Institution
N/A
Abstract

This work develops Distributed Information Assurance (DIA) system based on the distributed data mining technology. The key capabilities are: ++Multi-agent architecture linking multiple, heterogeneous network-sensors to perform distributed and decentralized analysis of the data, supporting local management of the policy-based control for different sensors. ++Collection of distributed data mining algorithms. ++Module for supporting the complete life-cycle of the information assurance management process in a BMDS including information discovery, linking cross-domain information, policy management, and effective utilization of the knowledge. ++Detect (a) distributed network “signatures” of attackers based on distributed observations from different nodes in the network. (b) attack patterns on different components of the BMDS network in terms of clusters, outliers and also identify statistical properties of attack distribution in order to perform a trend analysis. (c) stealth network probes by attackers and worms (d) insider attacks on the BMDS network. The DIA system will be interfaced with existing third-party network sensors such as network intrusion detection systems (e.g. SNORT), host-based intrusion detection systems (OSSEC), router logs (e.g. CISCO Netflows), network and personal firewalls. ++Web-service based service-oriented architecture for quick intervention from the administrators, distributed collaboration among peers supporting analysis of a threat by allowing case archival and case-based reasoning.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government