SBIR-STTR Award

Distributed Streams-based Data Mining for Application Intrusion Detection
Award last edited on: 4/26/2019

Sponsored Program
STTR
Awarding Agency
DOD : AF
Total Award Amount
$99,915
Award Phase
1
Solicitation Topic Code
AF03T011
Principal Investigator
Kevin Yurica

Company Information

Realtime Methods

3940 Freedom Circle
Santa Clara, CA 95054
   (650) 944-7593
   press@rtmethods.com
   www.rtmethods.com

Research Institution

----------

Phase I

Contract Number: ----------
Start Date: ----    Completed: ----
Phase I year
2003
Phase I Amount
$99,915
This research is focused on the application of real-time data mining techniques to the challenge of application layer intrusion detection. Streams-based data mining methods are used to analyze distributed application access patterns and identify abnormal activity. This data streams approach removes much of the schema complexity and storage burden associated with traditional database implementations and can provide superior computational and storage efficiencies. The data stream model of computation is especially useful for very large data sets that need to be processed in a single pass. Application requests are examined using a series of clustering analysis perspectives that enable rapid profiling of individual requests against expected patterns. More complex evaluations can be supported by pipelining analysis stages, providing an inherently scalable solution that is well suited to distributed environments.

Benefits:
The work proposed here can be applied to both DoD and commercial data analysis challenges-the technology has significant potential to improve the performance and flexibility of real-time data mining. The use of centralized data mining architectures may be unsatisfactory for certain applications due to the inherent time delay that accompanies off-line processing. It is believed that a streams-based approach will be faster and more scalable than traditional data mining approaches. In the intrusion detection area, traditional perimeter security implementations such as firewalls need to be supplemented with application-level security measures that will limit access to sensitive data once an usual access pattern has been identified. The approach described here may be a viable alternative or supplement to ‘hardening’ each individual application or encrypting data stores. The results of this effort will be applied to application intrusion detection product development targeted at the high-end security market. Abstract: Real-time, Data, Analysis, Streams, Data mining, Intrusion detection

Phase II

Contract Number: ----------
Start Date: ----    Completed: ----
Phase II year
----
Phase II Amount
----