To help support critical networks across all domains, from commercial enterprise IoT to military networked systems, SCALABLE developed the EXata Cyber library to evaluate network designs for cyber resilience. The user can create a network digital twin of their physical network to gain unique visibility into their network’s performance and how it will respond to a cyber attack. The user can add various security elements from the Cyber library and run different cyber attack scenarios using multiple types of attack elements that result in network information flow degradation. As a result, users can properly identify any potential vulnerabilities and eliminate them accordingly. EXata Cyber can simulate many types of cyber attacks with specific characteristics and points of attack against software virtual networks.
The Cyber library implements a broad range of attack characteristics that can be focused in a variety of ways against a software virtual network. The user can dynamically launch cyber warfare features on a simulation network model, including eavesdropping, radio jamming attacks, distributed denial of service (DDoS) attacks, and a variety of attacks detectable with 3rd party network intrusion detection software (NIDS) like snort. Attacks can be targeted on specialized networks like wireless, wired, mobile ad-hoc (MANET), and tactical networks. Computer networking simulation software allows the users to analyze their impact on the network itself, the applications, and the end-users. Some of the specific types of attacks that users can simulate include:
- Distributed denial of service (DDoS) attacks
- Radio jamming attacks
- Eavesdropping
- Snort and other attacks detectable through 3rd-party network intrusion detection software (NIDS)
Users also have the ability to test attacks on different types of specialized networks, including wired, wireless, tactical, and mobile ad-hoc (MANET) networks. When testing cyber attacks, you can see precisely how they affect the network, along with specific applications and the user’s experience. Subsequently, you’ll be able to determine which areas of your systems are most exploitable and make adjustments to improve security and connectivity.
Cyber Attacks of Emulated Networks
Benefits of the EXata Cyber Library:
-
- Enables users to gain unique visibility into how a network and the applications that use it will respond during a cyber attack
- Launch cyber warfare features on a model, including eavesdropping, radio jamming attacks, distributed denial of service (DDoS) attacks, and a variety of attacks detectable with 3rd part network intrusion detection software (NIDS) like snort
- Provides ultra-high fidelity simulated representations of large scale wireless, wired and mixed-platform network performance and behavior
- Virtual models can be seamlessly integrated with live equipment and applications to create sophisticated live-virtual constructive (LVC) environments
Introducing the Cyber Attack Editor
Cyber resilience is becoming a key metric for all network deployments. EXata responds to the needs for cyber resilience analysis by increasing the breadth of our model capabilities and by simplifying the design of attack vectors. The cyber-attack editor, new in 7.3, allows the user to design a library of historical or zero-day attacks using a no-code paradigm. Using this editor, users can direct distributed and adaptive network-wide attack vectors and assess the impact of vulnerabilities on key performance metrics. Our enhanced cyber model library now includes phishing, ransomware, data-stealing attack in host model, a new Human- in-the-loop application for receiving malicious email, triggering host model attacks, and an added GUI interface to create and manage adaptive attack scripts visually.
Enhancing Command PE with Network Digital Twins
Watch our new, ground-breaking software integration. The leading professional operational wargame, Command Professional Edition, will take advantage of EXata Network Digital Twins. All of the extremely powerful cyber, communications, and networking capabilities of SCALABLE’s software are now usable within Command PE. This further enhances the possibilities to analyze and research in operational wargaming whilst remaining within the familiar environment of existing software applications.
Facilitating Maritime Communications with Network Modeling
EXata Cyber enables users to accurately simulate cyber attacks on a variety of virtual networks, including those used in maritime communications to maintain secure communications by testing the resilience of multi-domain networks. SCALABLE allows users to test undersea communications networks through Live, Virtual, Constructive (LVC) network models. With EXata Cyber, users can test wireless communications networks and sensors that are potentially vulnerable to certain atmospheric conditions, acoustic comms affected by sea states, and other network conditions that may impact communications in these unique environments.

EXata Cyber Behavior Models
Every aspect of a cyber attack can be modeled and prepared for using our network digital twin cyber resilience tools. From IPSec and WEP to certificates, firewall, and public key infrastructure, there are plenty of models available in our expansive library. EXata Cyber offers the perfect blend of reliable emulation software and ample cyber capabilities to create an accurate network digital twin to improve security and protect vital networks from cyber threats.
Some of the specific cyber behavior models include:
-
- IPSec
- WEP/CCMP
- Certificate Model
- Firewall Model
- Public Key Infrastructure (PKI)
- Information Assurance Hierarchical Encryption Protocol (IAHEP)
- Internet Security Association and Key Management Protocol with Internet Key Exchange (ISAKMP-IKE)
- Secure Neighbor Model
- Adversary Model
- Anonymous On-Demand Routing (ANODR)
- Denial of Service (DOS) Attack Model
- Signal Intelligence (SIGINT) Attack Model
- Virus Attack Model
- Wireless Eavesdropping Model
- Wireless Jamming Model
- CPU and Memory Resource Model
Datasheet