Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
DoD begins use of specialized cloud for big data analytics
Wednesday - 1/15/2014, 2:43pm EST
The Defense Department is in the early stages of a project that it hopes will make good on a major technology aspiration across government: harnessing the vast, unstructured volumes of information generated by IT systems known as "big data" to drive decisions and improve day-to-day operations.
The program, an analytical cloud dubbed Acropolis and developed by the Defense Information Systems Agency, has been up and running for about six months and is now absorbing data from disparate systems across the Defense Department. About 1,300 users are currently making use of the system via a newly-designed common presentation layer based on the open-source OZONE Widget Framework.
DISA is developing Acropolis as a service to be used by all DoD components and members of the intelligence community. For now, the agency is focused on using it for data dealing with cybersecurity and day-to-day network operations, said Bill Keely, the deputy chief technology officer for mission assurance at DISA.
"As far as the size of data, every single time an email gets sent off, there are like 100 different devices that get involved that are all logging records, so as far as the amount of data, it's definitely in those two," Keely said in an interview.
But in later stages of the fielding, DISA wants Acropolis, which is built in part on the public domain Accumulo platform first developed by the National Security Agency, to begin handling many other categories of big data within DoD, including financial accounting information and acquisition data.
"We're trying to get good performance metrics to track every project developed in DISA, the progress of fielding and meeting the goals of a program. Tying that in with financial information, all that's a really rich resource to allow us to do better as we go forward." Keely said.
DISA says the target user community for Acropolis includes system administrators on military bases, the newly-created cyber mission teams based at U.S. Cyber Command and staff at DoD's forthcoming enterprise operation centers (EOCs).
"Also, I'd like to have a program manager be able to log in and see how healthy the system he's fielding is, so he doesn't have to wait and use his customers as his quality assurance checkers," Keely said. "Instead, he can use data that he's designed into his system to feed into our cloud."
Also in the early stages of the program's fielding, DISA is designing in capabilities to proactively screen DoD networks for insider threats and cyber espionage.
During the first increment of the effort, Acropolis will scan email, Web and system log traffic based on 15 different classified analytic criteria.
"What we don't want to do is to be in a posture where we find out about insiders after the fact," Keeley said. "We want to find them as they start doing bad things, and if you look back at all the espionage cases, they've typically been plying their trade for quite a while, and it causes too much damage. We have to get them early in the lifecycle of things going bad, because often they'll try a few things first, they start building their confidence and then start doing more. We want to get that early on so we can turn it over to the proper authorities."