Cyber Test Analysis and Simulation Environment (Cyber TASE) is a Test Resource Management Center (TRMC)-sponsored Central Test and Evaluation Investment Program (CTEIP) capability enhancement program, created to address the lack of effective cyber testing instrumentation to assess defensive mechanisms and the lack of a mature Live-Virtual-Constructive (LVC) environment to model large-scale operational scenarios. Cyber TASE will improve LVC capabilities by implementing an enhanced, scalable LVC environment quickly and be easily customizable to support multiple simultaneous cyber assessment tests of diverse DoD networks and network-enabled systems, using operationally-realistic scenarios.
Cyber TASE has a requirement for a Constructive Simulation Environment (CSE) component to perform constructive modeling. The CSE provides an intuitive, user-focused GUI to develop constructive simulations and LVC models.It is supported by a pre-defined palette of functionalities that include the ability to import network topologies directly into the model, configure cyber attack and computer network defense (CND) models, interface with physical platforms and devices, configure logging, and utilize user-defined measures of effectiveness (MoEs), measures of performance (MoPs) and mission metrics.
The Joint Network Emulator (JNE) integrated with StealthNet, a library of cyber attack and defense models developed by SCALABLE under Government contract, will serve as the basis for the constructive component of Cyber TASE. JNE provides high fidelity models of battlefield communication networks and systems. The StealthNet library provides models for accurate cyber threat simulation at all layers of the networking stack to include passive, active, coordinated and adaptive attacks on networks with hundreds to thousands of wired and wireless components. StealthNet together with JNE thus provides a Live-Virtual- Constructive (LVC) framework for a real-time, hardware-in-the-loop capability for simulation of cyber threats to the entire net-centric infrastructure. It also provides the ability to assess the effectiveness of adversaries to disrupt Blue Force communications by measuring the impact of these attacks via key performance indicators, i.e., bandwidth, reliability, delay and quality of service metrics. The LVC technology can stimulate constructive and LVC networks with simulated cyber threats that span the entire protocol stack layers for testing and analysis of applications.