EXata Cyber

Evaluate a Network Design for Resilience to Cyber Attack

Request a Demo

To help support critical networks across all domains, from commercial enterprise IoT to military networked systems, SCALABLE developed the EXata Cyber library to evaluate network designs for cyber resilience. The user can create a network digital twin of their physical network to gain unique visibility into their network’s performance and how it will respond to a cyber attack. The user can add various security elements from the Cyber library and run different cyber attack scenarios using multiple types of attack elements that result in network information flow degradation.  As a result, users can properly identify any potential vulnerabilities and eliminate them accordingly. EXata Cyber can simulate many types of cyber attacks with specific characteristics and points of attack against software virtual networks.

The Cyber library implements a broad range of attack characteristics that can be focused in a variety of ways against a software virtual network. The user can dynamically launch cyber warfare features on a simulation network model, including eavesdropping, radio jamming attacks, distributed denial of service (DDoS) attacks, and a variety of attacks detectable with 3rd party network intrusion detection software (NIDS) like snort. Attacks can be targeted on specialized networks like wireless, wired, mobile ad-hoc (MANET), and tactical networks. Computer networking simulation software allows the users to analyze their impact on the network itself, the applications, and the end-users. Some of the specific types of attacks that users can simulate include:

  • Distributed denial of service (DDoS) attacks
  • Radio jamming attacks
  • Eavesdropping
  • Snort and other attacks detectable through 3rd-party network intrusion detection software (NIDS)

Users also have the ability to test attacks on different types of specialized networks, including wired, wireless, tactical, and mobile ad-hoc (MANET) networks. When testing cyber attacks, you can see precisely how they affect the network, along with specific applications and the user’s experience. Subsequently, you’ll be able to determine which areas of your systems are most exploitable and make adjustments to improve security and connectivity.

Cyber Attacks of Emulated Networks

Benefits of the EXata Cyber Library:

  • Enables users to gain unique visibility into how a network and the applications that use it will respond during a cyber attack
  • Launch cyber warfare features on a model, including eavesdropping, radio jamming attacks, distributed denial of service (DDoS) attacks, and a variety of attacks detectable with 3rd part network intrusion detection software (NIDS) like snort
  • Provides ultra-high fidelity simulated representations of large scale wireless, wired and mixed-platform network performance and behavior
  • Virtual models can be seamlessly integrated with live equipment and applications to create sophisticated live-virtual constructive (LVC) environments

Introducing the Cyber Attack Editor

Cyber resilience is becoming a key metric for all network deployments.  EXata responds to the needs for cyber resilience analysis by increasing the breadth of our model capabilities and by simplifying the design of attack vectors.  The cyber-attack editor, new in 7.3, allows the user to design a library of historical or zero-day attacks using a no-code paradigm.  Using this editor, users can direct distributed and adaptive network-wide attack vectors and assess the impact of vulnerabilities on key performance metrics.  Our enhanced cyber model library now includes phishing, ransomware, data-stealing attack in host model, a new Human- in-the-loop application for receiving malicious email, triggering host model attacks, and an added GUI interface to create and manage adaptive attack scripts visually.

Enhancing Command PE with Network Digital Twins

Watch our new, ground-breaking software integration. The leading professional operational wargame, Command Professional Edition, will take advantage of EXata Network Digital Twins. All of the extremely powerful cyber, communications, and networking capabilities of SCALABLE’s software are now usable within Command PE. This further enhances the possibilities to analyze and research in operational wargaming whilst remaining within the familiar environment of existing software applications.

Facilitating Maritime Communications with Network Modeling

EXata Cyber enables users to accurately simulate cyber attacks on a variety of virtual networks, including those used in maritime communications to maintain secure communications by testing the resilience of multi-domain networks. SCALABLE allows users to test undersea communications networks through Live, Virtual, Constructive (LVC) network models. With EXata Cyber, users can test wireless communications networks and sensors that are potentially vulnerable to certain atmospheric conditions, acoustic comms affected by sea states, and other network conditions that may impact communications in these unique environments.

EXata Cyber Behavior Models

Every aspect of a cyber attack can be modeled and prepared for using our network digital twin cyber resilience tools. From IPSec and WEP to certificates, firewall, and public key infrastructure, there are plenty of models available in our expansive library. EXata Cyber offers the perfect blend of reliable emulation software and ample cyber capabilities to create an accurate network digital twin to improve security and protect vital networks from cyber threats.

Some of the specific cyber behavior models include:

  • IPSec
  • WEP/CCMP
  • Certificate Model
  • Firewall Model
  • Public Key Infrastructure (PKI)
  • Information Assurance Hierarchical Encryption Protocol (IAHEP)
  • Internet Security Association and Key Management Protocol with Internet Key Exchange (ISAKMP-IKE)
  • Secure Neighbor Model
  • Adversary Model
  • Anonymous On-Demand Routing (ANODR)
  • Denial of Service (DOS) Attack Model
  • Signal Intelligence (SIGINT) Attack Model
  • Virus Attack Model
  • Wireless Eavesdropping Model
  • Wireless Jamming Model
  • CPU and Memory Resource Model

Related Resources

Three Consequences of Not Testing Your System Under a Cyber Attack

Improve management, performance, and cyber resilience of networks in all domains, from commercial enterprise IoT to military networked systems operating from seabed to space.

Cyber Library for the EXata Live-Virtual-Constructive Simulation Platform

The Cyber Library for EXata enables you to gain unique visibility into how a network and the applications that use it will respond during a cyber attack.

Enhancing Wargaming Fidelity with Network Digital Twins

SCALABLE is partnering with Matrix Games to interface Command PE with EXata Cyber, to incorporate network digital twin models into the Command PE wargame environment.

Transportation Network Optimization and Network Performance

EXata Cyber is being used by many mainstream manufacturers to model existing and proposed in-flight networks and to evaluate throughput, jitter, and application performance.

White Papers

Get cutting-edge industry information. Access the entire library for additional resources.

Developing a Complex Simulation Environment for Evaluating Cyber Attacks

Protecting cyberspace during a war by connecting two dimensions: the physical and network to understand the real impact of cyber threats in order to accomplish the mission.

Ukraine Power Grid Attack - A Case Study on the Use of Network Digital Twins for Assessing Cyber Resilience

To prepare for the inevitable future cyber attacks, it is essential to understand and thoroughly analyze how cyber attackers can infiltrate the system, even those employing robust defense-in-depth strategies.

Enhancing Wargaming Fidelity with Network Digital Twins

Network Digital Twin technology incorporates high fidelity cyber, communications and networking simulation into a wargaming environment to support the development of effective operating concepts, capabilities, and plans.

Key Features of EXata

Real Time Emulator

Seamlessly interface with other live equipment and applications

Cyber Testing

Test the resiliency of your network to Cyber Attacks

Network Digital Twin

Test your network in a low-cost, zero-risk environment

Scalability

Model thousands of nodes with parallel execution

Model Fidelity

Models simulate accurate real-world behavior

Commercial enterprises, educational institutions, and governmental organizations around the world all depend on reliable, effective networks to deliver business-critical, mission-critical communications, and information. SCALABLE maintains a highly experienced group of technical professionals to support customers and projects of any scale and solve challenging problems with our advanced network digital twin technology.

Contact Us
White Papers
Newsletter