OPNET’s product family provides an integrated, full life-cycle suite for detection, analysis, visualization and planning, including:
OPNET’s products assist in a range of cyber defense and preparation activities, including regular configuration auditing to detect weakness and unauthorized network changes, modeling the impact of different cyber attacks and defenses, monitoring and operations services to provide live real-time cyber security analysis, and a training testbed to develop new tactics and train employees.
Networks carry business-critical services and applications, and are required to deliver high-performance while achieving no downtime and high integrity. Understanding vulnerabilities in the network and the impact of threats is the first step towards securing your network. Due to evolving attack techniques that leverage diverse vulnerabilities, it is critical to proactively identify and fix vulnerabilities and track the overall security posture of the network.
OPNET's network engineering, operations, and planning product suite provides a powerful framework for cyber-security analysis, network compliance, and security auditing workflows:
Studying the impact of cyber activity in both traditional and tactical networks allows you to evaluate different network configurations and their resilience to cyber attacks. OPNET’s suite is extensible to evaluate new cyber technologies, including attack, defense, and detection technologies. These cyber activities mimic realistic scenarios using OPNET’s extensive protocol and device library. These studies are executed in OPNET’s high performance discrete event simulation engine.
The cyber-attack library consists of out-of-the-box models for attacks such as distributed denial of service (DDOS), man-in-the-middle and routing attacks, and will also allow the creation of custom attack models.
The cyber-defense library consists of a set of typical defensive measures used to counter attacks, such as firewall policy updates, port blocking and interface shutdown. It will also allow addition of user-generated defense measures.
The cyber test and evaluation framework enables users to construct and evaluate cyber scenarios incorporating time-sequenced attack and defense patterns. This framework reports on list of attacks detected, network elements and services compromised and also provides insight into effectiveness of deployed defense measures.
An important component in any cyber security suite is the ability to
OPNET’s cyber suite allows you to monitor and troubleshoot your environment for possible cyber attacks. The following are some examples of monitoring that OPNET’s customers are using today.
A key part of any cyber security arsenal is the ability to simulate attacks and practice detecting and mitigating them. These activities require the creation of a testbed. This testbed should be scalable, flexible, exist before the real network is deployed, and easily manageable. It should also not be prohibitively expensive. This testbed can be used by seasoned professionals to conduct extensive wargaming to develop new tactics, and it can also serve as an entry-level trainer for employees new to the cyber security space.
OPNET's solution suite provides a powerful framework for a cyber-security testbed. Patented hardware-in-the-loop technology combines with an extensive protocol and model library to produce an extensible and flexible network consisting of both real and simulated devices.
Combining the cyber testbed with OPNET's large set of commercial and military protocol and device models enables testing of real scenarios, with geographically dispersed forces, a mix of tactical wireless networks as well as high bandwidth wired networks, and realistic mission traffic.In this scenario, an attacker runs a DDOS tool against an Apache web server running on a Linux VM