The Emulytics™ program at Sandia National Laboratories is focused on the scientific pursuit of the understanding of the behavior of complex, distributed cyber system. Over the last decade, we have developed and has deployed a suite of cyber emulation, modeling, and analysis tools that support uses including predictive simulation, training, test & evaluation, and resilient system design.
The term “Emulytics” was coined by practitioners to capture the intent of these efforts – a holistic approach to system emulation and analytics.
Emulytics™ experiments provide safe and isolated environments to study and test computing and communications systems and to exercise and train cyber staff. Enterprise computing and control systems environments are well supported today and we are developing support for emerging mobile computing and Internet of Things environments. Emulytics environments scale well and can be deployed on systems as small as a laptop and on clusters with hundreds of high performance servers. Our methodologies support the application of the scientific method to the study of cyber systems, and our tools make it easier to design, deploy, and collect data from virtualized experiments rapidly, reliably, and repeatedly.
Explore the characteristics of a system of interest, without having to impact actual operations.
Explore how defensive measures, tactics, techniques, and procedures perform under a wide variety of circumstances, configurations, and environments.
Development Test Bed – Cyber Engineering:
Rapidly explore and test system design alternatives using virtualized proofs of concept.
Exercise and Training Support:
Create cyber training environments designed to prepare staff to meet specific mission needs.
Virtualize key components of networks to provide dynamic and/or moving target defense.
Experimentation and Empirical Studies:
Run carefully controlled experiments that reveal the behavior of complicated systems under rare or malicious circumstances.
Sandia’s Emulytics™ efforts focus on using orchestrated virtual machines and networks to enable solutions in three broad application areas:
Human in the Loop:
Cyber teams must keep their skills up to date, and bringing new people on board can be an arduous and lengthy process. Read More...
How can we answer what-if questions about the behavior and performance of complicated computing and control systems we are interested in? Read More...
Imagine a system that changes dynamically and reacts to an intruders presence, making it difficult for the intruder to navigate and extract information and characteristics of your system. Read More...