Column Control DTX

BreakingPoint Keeps Louisiana National Guard a Step Ahead of Cyberattacks

Case Studies

BreakingPoint Keeps the Louisiana National Guard a Step Ahead of Cyberattacks

 

The National Guard symbolizes being ready for anything and everything, including the latest cyberattacks. Several years back, the Louisiana (LA) National Guard began operating a state-of-the-art cyber range facility to conduct training, test innovations, and build prototypes at Louisiana State University (LSU).

 

The team engaged Stephenson Technology Corporation (STC) to design cyber range training featuring Keysight’s BreakingPoint Security Testing and PerfectStorm hardware. Trusted by world-leading network security providers and Fortune 100 companies, BreakingPoint simulates more than 400 legitimate application traffic protocols and some 38,000 exploits including malware, viruses, and distributed denial of service (DDoS) attacks.

 

Validating a security infrastructure with BreakingPoint has been shown to increase an organization’s attack readiness by nearly 70 percent. In designing a curriculum to master basic cyber skills and techniques, STC chose the Keysight solution to generate realistic mixes of application and attack traffic.

 

“BreakingPoint gives us the ability to recreate real-life scenarios as closely as possible to see how different types of attacks affect various machines,” says Major Alan Dunn, commander of Louisiana National Guard’s Cyber Protection Team. “Soldiers can not only spot attacks; they get to see what’s behind them and do deeper exploration.”

 

Early cybersecurity initiatives spearheaded by STC include creating a small business security operations center (SOC) to strengthen cyber defenses across the Department of Defense (DoD) supply chain and infrastructure. The project gives analysts greater visibility into the traffic feeding into military bases from small family-owned shops, and veteran- or minority-owned businesses that might not employ cybersecurity experts.

 

The National Guard team also leveraged BreakingPoint in developing sensor technology that would help defenders spot and explore anomalies that might trigger alerts if left unaddressed. The research included testing multiple remote sensor hardware platform configurations to gauge their bandwidth and threat preprocessing capabilities.

 

“BreakingPoint was the only platform that could manage the throughput and realism we needed to conduct this research which benefits both state and national security,” Major Dunn says. “The system enables realistic framing to help recognize and identify something that looks odd instead of simply feeding a bunch of numbers to analysts.”

 

STC also employs BreakingPoint at a “smart house” test lab at LSU designed to improve security for the Internet of Things (IoT). According to Dunn, the house was originally designed to withstand the impact of a category five storm following the cataclysmic Hurricane Katrina. “We converted the building into a ‘smart house’ environment with a system that lets us test all the things in a house that might connect to the Internet — garage door openers, appliances, baby monitors — and see how they’re communicating on the back end.”

 

Quickly paying dividends, the testing conducted at the new IoT lab showed that sensors attached to a popular brand of baby monitor were sending data to foreign countries unencrypted and automatically clicking on ads to generate revenues for hackers.

×

请销售人员联系我。

*Indicates required field

您希望以何种方式进行联系? *必填项
Preferred method of communication? 更改电子邮件地址?
Preferred method of communication?

请通过单击按钮,提供给是德科技您的个人数据。请在Keysight隐私声明 中,参阅有关我们如何使用此数据的信息,謝謝。

感谢您!

A sales representative will contact you soon.

Column Control DTX