top of page



541511 - Custom Computer Programming Services
541512 - Computer Systems Design Services
541513 - Computer Facilities Management Services
541519 - Other Computer Related Services

518210 - Data Processing, Hosting, and Related Services.

Network dominance is an integral part of the cyber fight. Cyber threats demand new approaches to managing information, securing information, and ensuring our ability to operate. Cyberspace is on par with the other war-fighting domains of land, sea, air and space. It is in cyberspace that we must use our strategic vision to dominate the information environment throughout interdependencies and independent systems.


Today's cyber security defenses are failing because, in the battle against cybercrime, security teams are using an outdated arsenal. They rely too heavily on legacy platforms that leverage technology dependent upon signatures—and while these platforms may be good at blocking basic malware that is known and documented, they stand little chance against today's sophisticated, dynamic cyber attacks that occur across multiple vectors, stages and with no signatures.

Cyber security data protection business technology privacy concept. .jpg
Our Simulation Modeling Capabilities

Our simulation modeling capabilities are honed to replicate the basis on which these types of attacks occur. They highlight how exposed your systems may be to such attacks enabling you to make advanced decisions about what to do to reduce and mitigate their effects on your decision space and your operational effectiveness.

The simulation approaches we use are able to model large, complex stochastic systems for advanced contingent planning, war response configurations, forecasting or performance measurement purposes. they are the most effective quantitative modeling techniques in use.

The selection of simulation as a modeling tool is usually because it is less restrictive from a cost and effectiveness standpoint. The old legacy systems have their own innate constraints also. In addition, other modeling techniques may impose material mathematical restrictions on the process, and also require multiple intrinsic assumptions to be made.

Simulation Models usually tap into the following four steps:

•         Modeling the system as a dynamic stochastic (i.e. random) state space

•         Generation of the realizations of this stochastic process

•         Measurement of Simulation data

•         Analysis of output data and System Improvements



In addition, enterprises and government agencies are under virtually constant attack today. Significant breaches at RSA, Global Payments, ADP, Symantec, International Monetary Fund, and a number of other organizations have made headlines—and undoubtedly thousands more have occurred that we haven’t even heard about. Flame, Stuxnet, and a number of other cyber attacks have been uncovered that set an entirely new standard for complexity and sophistication.

Fundamentally, these developments make clear that the cybercriminals, nation-states, and hacker activists waging these attacks are growing increasingly sophisticated and more effective in their efforts to steal and sabotage. Leveraging dynamic malware, targeted spear phishing emails, elaborate Web attacks and a host of other tactics, these criminals know how to bypass traditional security mechanisms like firewalls and next-generation firewalls, IPS, anti-virus (AV), and gateways. That's where most of the harm has been and will continue to be done.


In our communication and computer network research, we use network simulations as a technique where a program models the behavior of a network either by calculating the interaction between the different network entities (hosts/packets, etc.) using mathematical formulas, or actually capturing and playing back observations from a production network.

The behavior of the network and the various applications and services it supports can then be observed in a test lab.

We build these labs using Rockwell Automation's Advanced Simulation Modeling Environment called ARENA. The tool compensates for many of the uncertainties we normally encounter when we attempt to replicate the real world in a simulated environment. it lowers the cost of examining those uncertainties and their likely impact on our downstream decisions and it allows us to create the kind of awareness that hitherto could only be gained by those who had deep pockets.


Welcome to the world of Perfect Information and where MBDM has a Distinctive Competence...

Contact us...

bottom of page