Peraton Labs
  • About
    • Our Story
    • Markets we serve
    • Leadership
    • Contact us
    • Visit peraton.com →
  • Research
    • 5G
    • Cybersecurity
    • Electronic warfare
    • Machine learning and data analytics
    • Mobility
    • Optical, photonics and quantum
    • Wireless systems and networks
  • Services
    • Critical infrastructure
    • Networking and cloud
    • Service and data assurance
    • Other services
  • Products
    • Critical infrastructure
    • Cybersecurity
    • Network defense
    • Spectrum solutions
    • Wireless solutions
    • Other products
  • News and media
    • Highlights >
      • Peraton Labs Dynamic 5G Spectrum Management
      • Peraton Labs Supports Cyber Tatanka 2023
      • BRAHMS: Resource Orchestration for CEMA for MDO
      • Bus Defender for Platform Cyber Survivability
      • Improving Power Grid Physical Security
      • CLOSURE Toolchain for Cross-Domain Solutions
      • Conceptual Simulation for Designing High Performance Computers
      • FLEET: Reconfigurable Optical NICs for Fast Data Transfer
      • Turbocharge Simulation
      • Analytics and AI for Predictive Maintenance
    • Press releases
    • Media hits
  • Careers
    • Life at the Labs
    • Tackling Tomorrow's Challenges
  • Search
Our products > Cybersecurity > Distributed, Assured and Dynamic Configuration (DADC) 

Distributed, assured and dynamic configuration (DADC)

Efficient, secure and accurate design for cyber infrastructure, cloud and cyber physical systems

Configuration is the DNA of cyber infrastructure. Correctly configuring complex cyber infrastructure is notoriously difficult with configuration errors leading to 50%-80% of network vulnerabilities and downtime. Our researchers developed the DADC system to address these problems through automated configuration synthesis and repair, system-generated emulation for testing and analysis, and visualization and verification.  

Our DADC solution secures networked systems. It has been successfully extended to efficiently and accurately configure cloud deployments and to securely design cyber physical systems (CPS) such as robotics and autonomous vehicles. 

Jump to

​How it works
Features
​
​Advantages
Resources
Research, services and products of interest
​Request more information
Picture
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com/?data-scroll-to-anchor=HowItWorks
Copy for linking from an external page:
https://www.peratonlabs.com/?data-anchor-link=HowItWorks

How it works

Correctly configuring cyber infrastructure requires setting configuration variables to simultaneously satisfy a myriad of interdependent connectivity, security and redundancy requirements. This is a daunting task that can take days or weeks as 100s to 1,000s of configuration variables must be defined and shown to satisfy from 1,000s to tens of thousands of constraints. 

DADC utilizes an innovative constraint-solving technique to automatically generate correct, compliant designs in seconds and to detect mis-compliances and correct them to enforce compliance. It produces provably-compliant designs with validation that all requirements are met. DADC can also be used for moving target defense by proactively changing to a new, compliant design to confuse adversaries.  
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com?data-scroll-to-anchor=features
Copy for linking from an external page:
https://www.peratonlabs.com?data-anchor-link=features

Features

  • Visual requirement specification: allows you to visually specify requirements in about the same amount of time as it takes to draw these out on paper  
  • Configuration synthesis: automatically transforms requirements into satisfying configurations—eliminating configuration errors  
  • Configuration repair: identifies configurations that are noncompliant with requirements and calculates the minimum cost configuration changes to bring these into compliance  
  • Visualization: provides a conceptual understanding of the network via visualizations of a large number of logical structures and relationships latent in the current configuration  
  • Verification: evaluates how the access of an adversary can propagate through the network  
  • Distributed configuration: allows enforcement of global configuration consistency in the absence of a centralized configuration authority  
  • Emulation interface: allows the designed network to come alive and be tested in minutes with the CORE Linux network emulation system  
  • In-band configuration: removes the need to create an out-of-band network for configuration management  
  • Network support: covers commonly used features of IPv4/IPv6 routing, security, fault-tolerance and QoS, for Cisco, Juniper, Linux, Palo Alto and Vyatta  
  • Cloud support: allows specification and configuration synthesis for cloud deployments with automatic generation of accurate configuration across multiple private and public clouds  ​
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com/?data-scroll-to-anchor=Advantages
Copy for linking from an external page:
https://www.peratonlabs.com/?data-anchor-link=Advantages

Advantages

  • Allows network and cloud infrastructure to be set up in minutes 
  • Eliminates configuration errors ensuring secure infrastructure design 
  • Significant reduction in human effort for faster, lower cost designs without human errors 
  • Supports hybrid cloud architecture—a single DADC specification can generate accurate configuration for a cloud that is deployed across different vendors’ cloud infrastructure and across public clouds and private data centers 
  • Proactively changes configurations to confuse an adversary 
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com?data-scroll-to-anchor=resources
Copy for linking from an external page:
https://www.peratonlabs.com?data-anchor-link=resources

Resources

Read more

​​DADC overview sheet (PDF)
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com/?data-scroll-to-anchor=links
Copy for linking from an external page:
https://www.peratonlabs.com/?data-anchor-link=links

Research, services and products of interest

Research

  • Cybersecurity research: innovations to protect mission-critical networks, services, systems and infrastructure 

Services

  • Network migration and modernization​: design and implement hybrid / private / public infrastructure for security, affordability, resilience and ease of operation
  • Secure cloud design and validation: rapid, accurate and secure specifications to efficiently design clouds and validate and ensure policy compliance

Products

  • Cyber Virtual Assured Network (CyberVAN™): high-fidelity network environment for cyber experimentation, operational planning, validation and training
  • DDoS Defender™: defend essential infrastructure from DDoS attacks to maintain critical services
  • Distributed Enclave Defense Using Configurable Edges (DEDUCE): rapid service restoration and situational awareness from the network edges
Anchor Element
Copy for linking on the same page:
https://www.peratonlabs.com?data-scroll-to-anchor=requestinfo
Copy for linking from an external page:
https://www.peratonlabs.com?data-anchor-link=requestinfo

Request more information
ConfigAssure (under construction)
Contact us
​About
​Research
​Services
Products
​Careers
​
News and media

peraton.com
Markets we serve:
Defense
Energy
​
Financial
Government 
Life sciences 
Telecommunications
Transportation
​
Picture
© 2024 Peraton Labs.  Site map | Terms of use | Privacy policy
  • About
    • Our Story
    • Markets we serve
    • Leadership
    • Contact us
    • Visit peraton.com →
  • Research
    • 5G
    • Cybersecurity
    • Electronic warfare
    • Machine learning and data analytics
    • Mobility
    • Optical, photonics and quantum
    • Wireless systems and networks
  • Services
    • Critical infrastructure
    • Networking and cloud
    • Service and data assurance
    • Other services
  • Products
    • Critical infrastructure
    • Cybersecurity
    • Network defense
    • Spectrum solutions
    • Wireless solutions
    • Other products
  • News and media
    • Highlights >
      • Peraton Labs Dynamic 5G Spectrum Management
      • Peraton Labs Supports Cyber Tatanka 2023
      • BRAHMS: Resource Orchestration for CEMA for MDO
      • Bus Defender for Platform Cyber Survivability
      • Improving Power Grid Physical Security
      • CLOSURE Toolchain for Cross-Domain Solutions
      • Conceptual Simulation for Designing High Performance Computers
      • FLEET: Reconfigurable Optical NICs for Fast Data Transfer
      • Turbocharge Simulation
      • Analytics and AI for Predictive Maintenance
    • Press releases
    • Media hits
  • Careers
    • Life at the Labs
    • Tackling Tomorrow's Challenges
  • Search