How IAD Leverages Big Data for Anomaly and Malware Detection (v10.2)

ABSTRACT

Malware is growing increasingly sophisticated. Threats are becoming more targeted and moving to places where existing defenses have limited visibility. Proactively addressing these threats means leveraging insights gained from Big Data and the fusion of multiple sources of information. Operational Fusion and Analysis, OFA, an organization within the National Security Agency’s Information Assurance Directorate utilizes Big Data to provide battlespace awareness and critical intelligence on the attack lifecycles of intrusions to decision makers and network defenders. This is accomplished by performing qualitative and quantitative analysis, summarization, fusion, and trending of data across multiple networks, customers, and domains. The more insight the OFA gains into a network or series of networks, the more easily abnormal activity can be identified.


AUTHORS

Information Fusion and Analysis Office Information Assurance Directorate
National Security Agency, Maryland, United States

Sue A. (Sandi) Roddy is the Technical Director, Analysis and Data Fusion, IAD. She provides technical leadership and strategic direction when performing technical assessments of Information Technology (IT) products and systems. She also provides technical leadership and strategic direction to achieve automation of analysis of cyber data in support of Department of Defense (DoD) and Intelligence Community (IC) networks and systems. Ms. Roddy has a B.S. in Computer Science from the University of Maryland, University College, and an M.S. in Information Technology from the University of Maryland, University College. She is also certified as an Information Systems Security Professional (CISSP), Information Systems Security Engineering Professional (ISSEP).

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com