StealthNet Cyber Library

Design, Test, Analyze & Assess Cyber Resilience of Tactical Battlefield Communications and Networks

Request a Demo

The Services have become increasingly dependent on their tactical networks for mission command functions, situational awareness, and target engagements (terminal weapon guidance). While the networks dramatically enhance the capability to conduct complex missions, they also make the mission operation more vulnerable to cyber attacks. Consequently, there is a critical need to accurately assess the cyber resilience of systems in the net-centric battlespace by investigating the operational impact of cyber attacks (e.g., denial-of-service, virus, wormhole, etc.) on these systems.

Current simulations of the net-centric battlespace do not accurately recreate impacts of network attacks due to lack of high-fidelity threat representations that include passive, active, and coordinated threats. StealthNet was designed to address this gap in the Department of Defense (DoD) testing infrastructure to realistically test the vulnerabilities and resilience of Blue Force communications against sophisticated cyber attacks, particularly on existing and emerging multi-domain networks. StealthNet provides the ability to quantify the degradation of Blue Force communications via key performance indicators, i.e., bandwidth, reliability, delay, and quality of service metrics.

Network Digital Twin Technology to Accurately Represent the Network System Under Test (NSUT)

The following figure provides a high-level operational view of the StealthNet framework which uses our network digital twin technology to accurately represent the Network System Under Test (NSUT). Network digital twins utilize network emulation technology to provide a high fidelity, computationally efficient, and scalable environment for cyber operations. The Network System Under Test (NSUT) can be a tactical or enterprise network scalable to thousands of devices across distributed sites.

Unparalleled Testing and Analysis

StealthNet provides insight into system performance during cyber attacks by quantifying the information gathered. Cyber test and evaluation metrics help gauge the operational impact of both cyber offense and defense strategies. In effect, StealthNet combines both science and technology to allow you to properly measure system performance. Using the data collected through StealthNet, you can effectively validate any vulnerabilities and assess mission impact. In testing impact on user communication amid cyber threats, you can also operate in either live or virtual environments to see how well users can communicate with each other.  Whether testing systems or the users behind them, StealthNet offers consistent results with proven methodologies and technology.

StealthNet Capabilities & Features

Whether using tactical or enterprise network architecture and devices, StealthNet allows users to simulate many types of cyber attacks such as PHY layer attacks and middleware/application attacks, along with different defense mechanisms to protect against those attacks. Users have the ability to represent attacks ranging from PHY layer attacks to application/middleware attacks as well as defense mechanisms; OS related vulnerabilities, user behavior models, adaptive attacks, and coordinated attack mechanisms. StealthNet is also capable of scanning systems to collect and relay data about the simulated network architecture. These capabilities make StealthNet consistently reliable and highly versatile to meet the needs of nearly any testing environment and network.

For added scalability, StealthNet also features Parallel Discrete Event Simulation (PDES). This gives you the ability to model large-scale cyber attacks on networks working with up to hundreds or thousands of wireless and wired components. Through PDES, live users can devise attack strategies against LVC representations of networks. In these instances, users can script automatically initiated attack sequences based on a previous attack’s success or failure. The advantage of these scripted attacks is the ability to compare the performance of varying tactical network architectures when hit with multiple attacks.

Related Resources

StealthNet - A Cyber Attack Model Library

StealthNet allows users to represent in simulation a wide range of cyber-attacks operating on tactical and enterprise network architectures and devices. It supports design, test, analyze, and assess cyber resilience of tactical battlefield communications and networks.

JNE - Live-Virtual-Constructive (LVC) simulation platform for the development, test and evaluation of battlefield communications networks

JNE, a Government-Off-The-Shelf (GOTS) library that uses EXata as the underlying network simulation software has been interfaced with StealthNet, to assess the cyber resilience of battlefield networks and operational mission threads.

StealthNet: A Live-Virtual-Constructive (LVC) Framework for Cyber Operations Test, Evaluation and Training

StealthNet can interface with existing LVC military network simulation and emulation tools, such as the Army’s Brigade level model OneSAF, and the Operational Test Commands test environment Battle Command Network Integration and Simulation (BCNIS) as well as commercial network simulators.

Key Features of EXata

Real Time Emulator

Seamlessly interface with other live equipment and applications

Cyber Testing

Test the resiliency of your network to Cyber Attacks

Network Digital Twin

Test your network in a low-cost, zero-risk environment


Model thousands of nodes with parallel execution

Model Fidelity

Models simulate accurate real-world behavior

Commercial enterprises, educational institutions, and governmental organizations around the world all depend on reliable, effective networks to deliver business-critical, mission-critical communications, and information. SCALABLE maintains a highly experienced group of technical professionals to support customers and projects of any scale and solve challenging problems with our advanced network digital twin technology.

Contact Us
White Papers