Intelligent Automation, Inc. (IAI) provides solutions that leverage the latest cryptographic technologies and extensive hands-on experience to protect the network, the information, and the overall system.

IAI provides practical and customized solutions for protecting the network, the information, and the overall system. We use advanced technologies and have extensive hands-on experience with wireless network security, cyber-attack analysis and mitigation, and cyber security testing and training. Our practical research and development is guided by the latest cryptographic theories. IAI’s long history of collaborating with leading technology vendors, academic researchers and federal program managers helps us understand specific problems and tailor our solutions.

IAI develops solutions to protect a broad range wireless and mobile communication networks, including Airborne, Tactical Ad hoc, Space, Cognitive Radio, and Sensor networks. Our areas of expertise include secure content distribution, security mechanisms for admission control, network control, network access control, network access maintenance, and secure routing.

IAI leverages in-depth knowledge, advanced technology and extensive hands-on experience to provide cyber-attack analysis and mitigation strategies and solutions. IAI conducts research and development on techniques such as Moving Target Defense and virtualization, to defend enterprise and cloud-based networks. IAI improves the performance of cyber defenders through enhanced situational awareness solutions. IAI also develops trust-based solutions to ensure the security of embedded systems.

IAI focuses on state-of-the-art cyber security testing and training to support cyber operations. IAI develops tools to record, assess, and visualize the performance of cyber security analysts and techniques. IAI maintains a large enterprise network testbed for cyber-attack emulation and defense strategy evaluation. This testbed can be used to reproduce a variety of scenarios for evaluating network protocols and security techniques.

Examples of our work

NIRVANA

NIRVANA, or Network Intrusion Risk and Vulnerability Analysis, is a network security management tool that provides comprehensive security analysis in enterprise networks. NIRVANA integrates attack graphs and application/mission dependency graphs to provide an integrated network security management tool.

SDNA

SDNA, Self-shielding Dynamic Network Architecture, dynamically alters network appearance and behavior to stop and contain cyber attacks while remaining transparent to the user. SDNA protects against successful network attacks, limits spread if the initial attack succeeds, and finally, provides transparency to the user, application, and operating system.

HINDL

HINDL, the Hidden Node multi-level Detection and Localization system,  finds hidden nodes in Cognitive Radio networks (CRNs). CRNs are very flexible and reconfigure rapidly compared to traditional wireless networks, making it easier for a node to “hide” in the CRN. HINDL takes various RF characteristics as inputs and detects, identifies and localizes hidden nodes using both anomaly detection and signature-based methods.

HERMES

HERMES is an automated cyber security assessment and visualization toolkit. Key features include live test event collection, storage, and processing, live visualization, automated test setup, recording and replay of test events, and assisted test script generation.

JANASSURE

JANASSURE is a software tool that automatically extracts enterprise network topologies from both IPv4 and IPv6 perspectives to determine connectivity and potential security risks. The extracted topology, combined with other IPv6 transition detection mechanisms, is utilized to check against security policies in order to assess and validate the current security status and IPv6 transition mechanisms.

NETBEAM

NETBEAM, a software tool for Network Behavior Analysis and Monitoring has an agent based distributed security architecture for automatic cyber behavior analysis. It collects and integrates network-level macro behavior analysis and host-level micro behavior analysis for cyber behavior anomaly detection, analysis and mitigation. Network and application failure information are combined with detection for integrated and comprehensive cyber behavior attribution and analysis.

Core Competencies

IAI provides practical and customized security solutions for protecting various wireless and mobile communication networks, including Airborne, Tactical Ad Hoc, Space, Cognitive Radio, and Sensor networks. Our clients include the Army, Air Force, DHS, and NASA.

Cyber security is a critical issue as networks are consistently attacked and compromised. Due to the ever-growing dependency on computer systems and networks for business transactions, systems face growing cyber threats from both inside and outside. IAI has in-depth knowledge, advanced technology and extensive hands-on experience in providing cyber-attack analysis and mitigation strategies and solutions. IAI is focused on cyber defense through prevention, attack detection and mitigation, and reliability and trustworthiness.

IAI is focused on state-of-the-art cyber security testing and training to support cyber analysis and mitigation. IAI has extensive expertise on cyber security, testing, and human cognitive training/learning and access to a large scale cyber network testbed.

What can we invent for you?