Peraton Labs
  • About
    • Our Story
    • Markets we serve
    • Leadership
    • Contact us
    • Visit peraton.com →
  • Research
    • 5G
    • Cybersecurity
    • Electronic warfare
    • Machine learning and data analytics
    • Mobility
    • Optical, photonics and quantum
    • Wireless systems and networks
  • Services
    • Critical infrastructure
    • Networking and cloud
    • Service and data assurance
    • Other services
  • Products
    • Critical infrastructure
    • Cybersecurity
    • Network defense
    • Spectrum solutions
    • Wireless solutions
    • Other products
  • News and media
    • Highlights >
      • Peraton Labs Dynamic 5G Spectrum Management
      • Peraton Labs Supports Cyber Tatanka 2023
      • BRAHMS: Resource Orchestration for CEMA for MDO
      • Bus Defender for Platform Cyber Survivability
      • Improving Power Grid Physical Security
      • CLOSURE Toolchain for Cross-Domain Solutions
      • Conceptual Simulation for Designing High Performance Computers
      • FLEET: Reconfigurable Optical NICs for Fast Data Transfer
      • Turbocharge Simulation
      • Analytics and AI for Predictive Maintenance
    • Press releases
    • Media hits
  • Careers
    • Life at the Labs
    • Tackling Tomorrow's Challenges
  • Search
Our research > Cybersecurity

Cybersecurity

Innovations to protect mission-critical networks, services, systems and infrastructure

Our cybersecurity research protects mission-critical systems and national cyber infrastructure through a broad range of initiatives in computer network defense, secure-by-design techniques and cyber operations and experimentation platforms. We have a long, successful track record of transitioning research innovations into effective cybersecurity solutions.

Jump to

Our work
​
Resources
​Related services
Related products
Request more information
Picture
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com?data-scroll-to-anchor=ourwork
Copy for linking from an external page:
https://www.peratonlabs.com?data-anchor-link=ourwork

Our work

Computer network defense

  • DDoS Defender™: dynamically hides high-value cyber assets and misleads and confuses adversaries using defensive and deceptive maneuvers. Combining multiple, proven innovations, our solution delivers superior defensive capacity to detect and deter both very high-volume as well as targeted, low-volume DDoS attacks 
  • Distributed Enclave Defense Using Configurable Edges (DEDUCE): resilient communications to provide real-time, “fight through” service restoration from the network edges. DEDUCE delivers a general-purpose, edge-based network event mitigation system that improves operator situational awareness and service assurance 
  • Data-driven network threat detector: a cyber hunting system that detects and characterizes threats at scale, in real-time, for large enterprise networks. Our solution automatically sets hunt priorities, to minimize detection time and identify both known and novel threats with high confidence 
  • 1553 Bus Defender™: protects warfighting systems from attacks launched or propagated over the 1553 data bus. Bus Defender detects and blocks zero day and known cyber threats, requires no changes to system software or configurations, and also secures maintenance and test operations 
  • Securing embedded systems / Internet of Things (IoT): we created new technology for true air-gapped monitoring of embedded and IoT devices. Our cyber emissions monitor combines signal processing, machine learning and program analysis techniques to derive signatures from radio frequency, acoustic and power emissions to determine if a system is operating normally or has been compromised   

Secure by design

  • ​Configuration security for network-connected composed systems: our novel solution automates configuration for composed systems, while simultaneously minimizing the attack surface. An innovative combination of machine learning and optimization techniques is used to determine a system configuration that provides the best security while maintaining the intended functionality
  • Configuration automation for cyber infrastructure: our Distributed, Assured and Dynamic Configuration (DADC™) system securely and quickly configures network, cloud and hybrid infrastructure. Functionality includes automated configuration synthesis, policy compliance and repair, visualization and verification 
  • Provably secure systems and applications: via tools and programming extensions that express security intent to build multilevel security architectures that are correct-by-compilation. Enables software engineers to efficiently build provably secure architectures that can isolate and protect against high-risk transactions across system life cycles   

Other

  • Cyberwarfare platform: our platform and analytics for machine-speed cyber mission plan construction, deployment, execution and monitoring utilizes a unique combination of statistical algorithms and program synthesis and verification techniques to automatically identify the most promising cyber operations plans
  • Cyber reconnaissance framework: uses a data-driven, intelligent cyber collection pipeline that can identify information gaps and automatically define and execute targeted data collection actions to improve cyber intelligence
  • Machine learning for autonomous cyber defense: we are developing cyber defense capabilities that are autonomous, secure, easy to deploy and configure, adaptive and resilient to adversarial deception  
  • Cyber Virtual Assured Network (CyberVAN™): our platform provides a flexible, scalable cyber range for cyber experimentation and analysis. CyberVAN includes tools to automate the design and deployment of network scenarios and inject attacks for vulnerability assessment, mitigation analysis and cyber response training ​
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com?data-scroll-to-anchor=resources
Copy for linking from an external page:
https://www.peratonlabs.com?data-anchor-link=resources

Resources

Read more

​Cyber reconnaissance framework (PDF)
Securing the Nation's Critical Infrastructure: Summary of Work (PDF)
​Cyber integrity in SCADA systems (PDF)
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com?data-scroll-to-anchor=services
Copy for linking from an external page:
https://www.peratonlabs.com?data-anchor-link=services

Related services

  • Industrial control systems and IoT security: patented solutions to protect ICS, low-power WANs, IoT and SCADA systems for energy, utilities and smart cities
  • Information assurance and compliance: comprehensive security services ensure compliance and protect people, process, technology, information and infrastructure
  • Intelligent transportation system and security: full life cycle support for deployment of secure, resilient communications technology in transportation infrastructure
  • Secure cloud design and validation: rapid, accurate and secure specifications to efficiently design clouds and validate and ensure policy compliance
  • Smart grid field analysis: sophisticated services to efficiently resolve operational problems, troubleshoot service failures and validate security controls
  • Data and information analysis: modeling, analysis, discovery, visualization and validation for large complex information repositories across diverse fields
  • ​Content protection and data privacy: privacy-by-design, operations assurance and forensic analysis for DRM, HIPAA compliance and multimedia services
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com?data-scroll-to-anchor=products
Copy for linking from an external page:
https://www.peratonlabs.com?data-anchor-link=products

Related products

  • ​Bus Defender™: protecting fielded systems with 1553 data buses with on-platform, real-time defense and off-platform defense during maintenance and test
  • Cyber Virtual Assured Network (CyberVAN™): high-fidelity network environment for cyber experimentation, operational planning, validation and training
  • Distributed, Assured and Dynamic Configuration (DADC™)​: efficient, secure and accurate cyber infrastructure design
  • DDoS Defender™: defend essential infrastructure from DDoS attacks to maintain critical services
  • Distributed Enclave Defense Using Configurable Edges (DEDUCE): rapid service restoration and situational awareness from the network edges
  • SecureIO™ for Commercial Solutions for Classified (CSfC): software products to enable diverse apps on CSfC-compliant Android devices and to accelerate fielding
  • SecureSmart™ continuous monitoring as a service (CMaaS): real-time cyber defense for critical infrastructure, field area networks, energy systems and smart cities​
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com?data-scroll-to-anchor=requestinfo
Copy for linking from an external page:
https://www.peratonlabs.com?data-anchor-link=requestinfo

Request more information
Contact us
​About
​Research
​Services
Products
​Careers
​
News and media

peraton.com
Markets we serve:
Defense
Energy
​
Financial
Government 
Life sciences 
Telecommunications
Transportation
​
Picture
© 2024 Peraton Labs.  Site map | Terms of use | Privacy policy
  • About
    • Our Story
    • Markets we serve
    • Leadership
    • Contact us
    • Visit peraton.com →
  • Research
    • 5G
    • Cybersecurity
    • Electronic warfare
    • Machine learning and data analytics
    • Mobility
    • Optical, photonics and quantum
    • Wireless systems and networks
  • Services
    • Critical infrastructure
    • Networking and cloud
    • Service and data assurance
    • Other services
  • Products
    • Critical infrastructure
    • Cybersecurity
    • Network defense
    • Spectrum solutions
    • Wireless solutions
    • Other products
  • News and media
    • Highlights >
      • Peraton Labs Dynamic 5G Spectrum Management
      • Peraton Labs Supports Cyber Tatanka 2023
      • BRAHMS: Resource Orchestration for CEMA for MDO
      • Bus Defender for Platform Cyber Survivability
      • Improving Power Grid Physical Security
      • CLOSURE Toolchain for Cross-Domain Solutions
      • Conceptual Simulation for Designing High Performance Computers
      • FLEET: Reconfigurable Optical NICs for Fast Data Transfer
      • Turbocharge Simulation
      • Analytics and AI for Predictive Maintenance
    • Press releases
    • Media hits
  • Careers
    • Life at the Labs
    • Tackling Tomorrow's Challenges
  • Search