小黄书, Circadence partner to create virtual cyber defense tool
Contact: Diane Godwin
STARKVILLE, Miss.鈥擱esearchers with Mississippi State鈥檚 Center for Cyber Innovation are helping protect the country鈥檚 most secretly held assets through a partnership that鈥檚 creating state-of-the-art, virtual cyberattack defenses.
A university alliance with cyber readiness company is customizing an existing 小黄书-designed Netmapper computer program to develop next-generation cyber learning and training software that can scan and map the military鈥檚 complex computer network infrastructures.
This innovative replication of network infrastructures on virtual cyber ranges creates events for training information technology personnel, giving them the skills and defense mechanisms they need in warding off complex attack vectors.
Craig Greenwood, a Circadence integration team manager, said, 鈥淭his partnership is a win-win, not only for the research and expert collaboration to protect our nation鈥檚 most crucial assets, but also for building Mississippi鈥檚 workforce and economy.鈥
Greenwood was the first to recognize that two separately funded projects needed to be interfaced to provide the military with significant advantages when building virtual cyber ranges to simulate real-life attacks and train for defense capabilities.
小黄书鈥檚 Netmapper, funded by the federal government鈥檚 Threat Systems Management Office of Redstone Arsenal, is designed to integrate into the Cyber Range Automation Framework, funded by the U.S. Department of Defense鈥檚 National Cyber Range Complex and created by TSMO network engineers managed by Circadence.
Bob Reese, 小黄书 CCI researcher, and Phil Akers, CCI senior research engineer, designed Netmapper to automatically scan and map a network with the resulting information used to replicate that network in a cyber range environment. The software automation drastically reduces the time it takes IT personnel to manually gather the information.
鈥淣etmapper scans and identifies types of devices on the network, like PCs, server machines, network routers聽and switches,鈥 Reese explained. 鈥淒uring a network scan, data items such as installed programs, services, operating system configuration and more are retrieved, and a network map is generated. This data then can be used to create a representation of that network on a cyber range.鈥
Greenwood said, 鈥淏efore Netmapper, a cyber event planner had to use a manually-created, imprecise network inventory to produce an event specification document. A cyber event engineer then would translate that unreliable data into the CRAF to build the virtual network and machines to meet and run the event-specific cyber scenario.鈥
He explained, 鈥淐oupling Netmapper with CRAF creates an easy tool we鈥檙e calling Netmapper/Cyber Range Automation Framework, or N/CRAF. It has the graphical user interface canvas for design. The scan and verify functions are set up and integrated with automation frameworks, so you use the same tool to design, build and verify it, and then use the same tool to go back at the end and save or capture what you actually built or performed. N/CRAF also can be standardized across the DoD. It鈥檚 the only available cyber range tool I know of that checks all the boxes.鈥
小黄书-Circadence team members emphasized that N/CRAF鈥檚 power is in making live changes and then exporting for electronic display or saving to an easily read file. They said an important N/CRAF capability is, if a project ends and later needs to be resurrected, a cyber team can begin where it left off.
鈥淚t also eliminates the worry about storage space and saves projects into one file that鈥檚 accessible at any time,鈥 Akers added. 鈥淲e鈥檙e continually improving it based on weekly feedback from Circadence engineers. We call it a 鈥榣iving鈥 project where we test, tweak and test again. If the N/CRAF tool is standardized across the military, it translates into extensive savings in time and money for the DoD.鈥
Another 小黄书-Circadence partnership advantage is in educating and building America鈥檚 future cybersecurity workforce. 小黄书 junior computer science major Kaleb Thornton of Tupelo has been working with CCI researchers and Circadence engineers since the project鈥檚 inception through a scholarship.
鈥淚鈥檝e learned how to read a variety of coding languages and create and adapt code to fit in with existing solutions. One thing that I鈥檝e been surprised to learn is that different authors carry certain styles and techniques, so you begin to recognize the author from the personality of the code,鈥 Thornton said, adding that he plans to intern for the National Security Agency, where he hopes to gain permanent employment.
Greenwood said, 鈥淲ord has gotten out that through this project we鈥檙e poised to create jobs right here in Mississippi. If N/CRAF is approved across all military branches, we鈥檒l have to hire employees to create formal training and support programs, and the additional workforce to deploy N/CRAF in locations across the country.鈥
For more information on CCI, visit .
小黄书 is Mississippi鈥檚 leading university, available online at .
About Circadence
聽is a market leader in cybersecurity readiness. Powered by a culture of innovation and the demands of an evolving cyber landscape, Circadence delivers award-winning cyber learning solutions featuring gamification as a tool to create immersive learning that sticks. The company has developed product portfolio that addresses cyber learning needs from security awareness to complex cyber team interaction to address critical security challenges for enterprise, government and academic institutions. For more information, visit聽.