StealthNet Cyber Library
A Cyber Attack Model Library
StealthNet is a GOTS cyber modeling simulation capability developed under a Test Resource Management Center (TRMC) funded S&T project. Working in conjunction with the Joint Network Emulator (JNE), powered by EXata, StealthNet allows users to represent in simulation a wide range of cyber-attacks operating on tactical and enterprise network architectures and devices. It features models for a Live-Virtual-Constructive (LVC) framework for network simulation, test, and evaluation of operational network defenses against cyber attacks. The library contains models for accurate cyber threat simulation at all layers of the networking stack and can perform accurate simulations of various cyber threats at every networking layer.
StealthNet provides the ability to use a specific methodology and environment to test blue systems against various cyber attacks. Based on the system’s performance, you can then identify and eliminate any potential vulnerabilities to increase security. Additional capabilities include a wide variety of models, including encryption, jamming detection, backup channels, anonymous routing, Distributed Denial of Service (DDoS), routing misconfiguration, eavesdropping, and other models.
StealthNet and the Services
The Services have become increasingly dependent on their tactical networks for mission command functions, situational awareness, and target engagements (terminal weapon guidance). While the networks dramatically enhance the capability to conduct complex missions, they also make the mission operation more vulnerable to cyber attacks. Consequently, there is a critical need to accurately assess the cyber resilience of systems in the net-centric battlespace by investigating the operational impact of cyber attacks (e.g., denial-of-service, virus, wormhole, etc.) on these systems.
Current simulations of the net-centric battlespace do not accurately recreate impacts of network attacks due to lack of high-fidelity threat representations that include passive, active, and coordinated threats. StealthNet was designed to address this gap in the Department of Defense (DoD) testing infrastructure to realistically test the vulnerabilities and resilience of Blue Force communications against sophisticated cyber attacks, particularly on existing and emerging multi-domain networks. StealthNet provides the ability to quantify the degradation of Blue Force communications via key performance indicators, i.e., bandwidth, reliability, delay, and quality of service metrics.
Network Digital Twin Technology to Accurately Represent the Network System Under Test (NSUT)
The following figure provides a high-level operational view of the StealthNet framework which uses our network digital twin technology to accurately represent the Network System Under Test (NSUT). Network digital twins utilize network emulation technology to provide a high fidelity, computationally efficient, and scalable environment for cyber operations. The Network System Under Test (NSUT) can be a tactical or enterprise network scalable to thousands of devices across distributed sites.
Unparalleled Testing and Analysis
StealthNet provides insight into system performance during cyber attacks by quantifying the information gathered. Cyber test and evaluation metrics help gauge the operational impact of both cyber offense and defense strategies. In effect, StealthNet combines both science and technology to allow you to properly measure system performance. Using the data collected through StealthNet, you can effectively validate any vulnerabilities and assess mission impact. In testing impact on user communication amid cyber threats, you can also operate in either live or virtual environments to see how well users can communicate with each other. Whether testing systems or the users behind them, StealthNet offers consistent results with proven methodologies and technology.
StealthNet Capabilities & Features
Whether using tactical or enterprise network architecture and devices, StealthNet allows users to simulate many types of cyber attacks such as PHY layer attacks and middleware/application attacks, along with different defense mechanisms to protect against those attacks. Users have the ability to represent attacks ranging from PHY layer attacks to application/middleware attacks as well as defense mechanisms; OS related vulnerabilities, user behavior models, adaptive attacks, and coordinated attack mechanisms. StealthNet is also capable of scanning systems to collect and relay data about the simulated network architecture. These capabilities make StealthNet consistently reliable and highly versatile to meet the needs of nearly any testing environment and network.
For added scalability, StealthNet also features Parallel Discrete Event Simulation (PDES). This gives you the ability to model large-scale cyber attacks on networks working with up to hundreds or thousands of wireless and wired components. Through PDES, live users can devise attack strategies against LVC representations of networks. In these instances, users can script automatically initiated attack sequences based on a previous attack’s success or failure. The advantage of these scripted attacks is the ability to compare the performance of varying tactical network architectures when hit with multiple attacks.
StealthNet - A Cyber Attack Model Library
StealthNet allows users to represent in simulation a wide range of cyber-attacks operating on tactical and enterprise network architectures and devices. It supports design, test, analyze, and assess cyber resilience of tactical battlefield communications and networks.
JNE - Live-Virtual-Constructive (LVC) simulation platform for the development, test and evaluation of battlefield communications networks
JNE, a Government-Off-The-Shelf (GOTS) library that uses EXata as the underlying network simulation software has been interfaced with StealthNet, to assess the cyber resilience of battlefield networks and operational mission threads.
The Importance of Leveraging a Network Digital Twin
A network digital twin refers to a computer simulation model of the communication network. It can be used to study the behavior of its physical counterpart under a diverse set of operating conditions, including cyber attacks, in a low-cost and zero-risk environment.
Get cutting-edge industry information.Access the entire library for additional resources.
StealthNet: A Live-Virtual-Constructive (LVC) Framework for Cyber Operations Test, Evaluation and Training
StealthNet can interface with existing LVC military network simulation and emulation tools, such as the Army’s Brigade level model OneSAF, and the Operational Test Commands test environment Battle Command Network Integration and Simulation (BCNIS) as well as commercial network simulators
Parallel Discrete Event Simulation: The Making of a Field
The comprehensive approach To network simulation scalability for network planners to understand the events and activities leading to the creation, evolution, and growth of the parallel discrete event simulation field, especially in its formative years in the last quarter of the 20th Century.
Assessing Cyber Resilience of Military Systems Using LVC Models
Understand the importance of the Cyber Test Analysis and Simulation Environment (Cyber TASE) project and how it provides timely and accurate cyber evaluation assessments for military networks and systems.
Key Features of EXata
Real Time Emulator
Network Digital Twin
Commercial enterprises, educational institutions, and governmental organizations around the world all depend on reliable, effective networks to deliver business-critical, mission-critical communications, and information. SCALABLE maintains a highly experienced group of technical professionals to support customers and projects of any scale and solve challenging problems with our advanced network digital twin technology.