SCALABLE Network Technologies Introduces Cyber Warfare Communications Effects Solution for Training Environments

– A breakthrough communications test bed capability advances cyberwar training by enabling realistic network performance and cyber warfare effects in LVC environments –

dateCulver City, CA — SCALABLE Network Technologies, Inc. (SCALABLE), the leader in communications simulation technology, announced today that the company has developed a software capability that enables integration of realistic cyber warfare communication effects into a Live Virtual Constructive (LVC) environment. The result is an advanced system that provides more realistic training and improved analysis capabilities to counter the increasing vulnerability of military systems to computer network attacks (CNA).

Although current generation computer-based battlefield simulations deliver experiential realism in force positioning, troop movement, supply routing, enemy force detection/engagement, and damage calculation, next generation net-centric systems open up a new domain of cyber vulnerability that today’s war gaming systems don’t encompass. Without the inclusion of cyber warfare communications effects, battlefield modeling and simulation can be overly optimistic, risking and/or perpetuating negative training. By integrating high fidelity communication models that incorporate network attack/defense, as well as performance aberrations caused by various environmental factors, the ability to analyze and train for the impact of cyber warfare on mission outcome is dramatically improved.

Integration into Battlefield Simulation

This new synthetic cyber warfare test bed is capable of realistically representing a network-centric battlespace under cyber attack for testing and training applications. The test bed is achieved by integrating SCALABLE’s EXata®/Cyber platform with COTS Computer Generated Forces (CGF). Cyber warfare models (jammer, eavesdropper, distributed denial of service, network attack) are developed and implemented within EXata/cyber. For the integration, both tools take advantage of an Interface Control Document (ICD) that works via the HLA signal and data interactions to facilitate communications modeling between HLA federates.

Members of SCALABLE’s technical staff will deliver a paper titled “Introducing a Cyber Warfare Communications Effect Model to Synthetic Environments” at I/ITSEC, the world’s largest modeling, simulation & training conference, on Tuesday, November 30, 2010 at 5:00 PM in Room S320D. In the presentation the authors describe how they integrated a cyber warfare communications model into a Live Virtual Constructive (LVC) environment, and examine the impact of using the cyber warfare model versus the limitations of simplified communication models in synthetic environments. The I/ITSEC Conference is being held at the Orange County Convention Center, Orlando, FL.

About EXata/Cyber

The EXata/Cyber platform is a software capability designed specifically to support and accelerate development of cyber security capability for communication networks. EXata/Cyber provides a robust emulation environment that can expose vulnerabilities (friendly and opposing) that threaten communication networks, and enables the rapid development and testing of countermeasures.

Based on the EXata® platform, SCALABLE’s proven network emulation tool, EXata/Cyber makes it possible to rigorously vet networks through creation of a “software virtual network” (SVN). SVNs are exact digital replicas of physical networks in virtual space – indistinguishable from a real network. SVNs are based on emulation, which enables them to interoperate with applications, devices, management tools, threats, and people – at real time speed. In contrast to other systems, SVNs emulate all of the layers in IP networks, scaling up to thousands of nodes. This provides cyber security planners high fidelity results that are comparable to physical testing – but more easily configurable and at much lower cost. This in turn makes it possible to design security into the networks and applications themselves, as opposed to bolting solutions on after the fact.

In today’s cyberwar conundrum, this capability brings advantage in a number of crucial areas: revealing vulnerabilities in network configurations; emulating mobile network performance where malicious attacks may be confused with environmental effects; understanding effects of cascading node failures; and training deployed personnel to rapidly defend and restore networks and shut down intruders.