Design and Deployment of Network Testbed for Web Data Security


  • Shishir Kumar Shandilya School of Data Science and Forecasting, Devi Ahilya University, Indore – MP, India School of Computing Science & Engineering, VIT Bhopal University, MP, India



Nature-Inspired Cyber Security, Adaptive Cyber Defense, Network Monitoring, Performance Tuning, Network Simulation


In recent years, the cyber security scenario has transformed predominantly from conventional response-based security mechanisms to proactive security strategies. And this transformation is still continuing which is shifting it from proactive security strategies to cyber immunity which eliminates the cyber threats by introducing stringent and adaptive security measures. In the process of developing new security algorithms/procedures, accurate modelling and effective simulation play a vital role for the robustness and effectiveness of proposed system. It is also necessary to analyze the behaviour of proposed system against multiple types of known cyber attacks. This paper focuses on the existing network testbeds for an effective analysis and monitoring while proposing a new network testbed for examining new security concepts like cyber immunity. The proposed network testbed is designed to incorporate the methods and procedures of Nature-inspired Cyber Security to accommodate the adaptive responses against the sophisticated and ever-advancing cyber attacks. The proposed testbed provides customizable analytical tool to design, test and examine the new security algorithms through a rich set of attack scenarios. It also allows developers to design, implement, and evaluate their defensive techniques with library support.


Download data is not yet available.

Author Biography

Shishir Kumar Shandilya, School of Data Science and Forecasting, Devi Ahilya University, Indore – MP, India School of Computing Science & Engineering, VIT Bhopal University, MP, India

Shishir Kumar Shandilya is a research scholar of higher doctorate at Devi Ahilya University and the Division Head of Cyber Security and Digital Forensics at VIT Bhopal University. He is working as a Principal Consultant to the Govt. of India for Technology Development and Assessment in Cyber Security. He is also a Visiting Researcher at Liverpool Hope University-United Kingdom, a Cambridge University Certified Professional Teacher and Trainer, ACM Distinguished Speaker and a Senior Member of IEEE. He is a NASSCOM Certified Master Trainer for Security Analyst SOC (SSC/Q0909: NVEQF Level 7) and an Academic Advisor to National Cyber Safety and Security Standards, New Delhi. He has received the IDA Teaching Excellence Award for distinctive use of technology in Teaching by Indian Didactics Association, Bangalore (2016) and Young Scientist Award for two consecutive years, 2005 and 2006, by Indian Science Congress and MP Council of Science and Technology. He has seven books published by Springer Nature-Singapore, IGI-USA, River-Denmark and Prentice Hall of India. His recently published book is on Advances in Cyber Security Analytics and Decision Systems by Springer.


S. Bitam, S. Zeadally, A. Mellouk, Bio-inspired cyber security for wireless sensor networks, IEEE Communications Magazine 54(6) (2016) 68–74.

U. Rauf, A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions, Arabian Journal for Science and Engineering 43(12) (2018) 6693–6708.

K. Demertzis, L. Iliadis, A bio-inspired hybrid artificial intelligence framework for cyber security, in: Computation, Cryptography, and Network Security, Springer, 2015, pp. 161–193.

S. N. Mthunzi, E. Benkhelifa, T. Bosakowski, S. Hariri, A bio-inspired approach to cyber security, Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices; CRC Press: Boca Raton, FL, USA (2019) 75.

M. E. Kuhl, M. Sudit, J. Kistner, K. Costantini, Cyber attack modelling and simulation for network security analysis, in: 2007 Winter Simulation Conference, IEEE, 2007, pp. 1180–1188.

D. S. Fowler, M. Cheah, S. A. Shaikh, J. Bryans, Towards a testbed for automotive cyber security, in: 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), IEEE, 2017, pp. 540–541.

G. Apruzzese, M. Colajanni, L. Ferretti, A. Guido, M. Marchetti, On the effectiveness of machine and deep learning for cyber security, in: 2018 10th International Conference on Cyber Conflict (CyCon), IEEE, 2018, pp. 371–390.

H. Jiang, T. Choi, R. K. Ko, Pandora: A cyber range environment for the safe testing and deployment of autonomous cyber attack tools, arXiv preprint arXiv:2009.11484.

M. Atighetchi, P. Pal, F. Webber, C. Jones, Adaptive use of network-centric mechanisms in cyber-defense, in: Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, 2003., IEEE, 2003, pp. 183–192.

G. Cybenko, M. Wellman, P. Liu, M. Zhu, Overview of control and game theory in adaptive cyber defenses, in: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, Springer, 2019, pp. 1–11.

Z. Hu, P. Chen, M. Zhu, P. Liu, Reinforcement learning for adaptive cyber defense against zero-day attacks, in: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, Springer, 2019, pp. 54–93.

J. B. Fraley, J. Cannady, The promise of machine learning in cybersecurity, in: SoutheastCon 2017, IEEE, 2017, pp. 1–6.

I. Ghafir, M. Hammoudeh, V. Prenosil, L. Han, R. Hegarty, K. Rabie, F. J. Aparicio-Navarro, Detection of advanced persistent threat using machinelearning correlation analysis, Future Generation Computer Systems 89 (2018) 349–359.

M. Breza, J. A. McCann, Lessons in implementing bio-inspired algorithms on wireless sensor networks, in: 2008 NASA/ESA Conference on Adaptive Hardware and Systems, 2008, pp. 271–276. doi:10.1109/AHS.2008.72.

S. Mthunzi, E. Benkhelifa, T. Bosakowski, S. Hariri, A Bio-inspired Approach To Cyber Security: Principles, Algorithms, and Practices, 2019, pp. 75–104. doi:10.1201/9780429504044-4.

N. Pankov, Applied cyberimmunity: What is it?,, [Online; accessed 10-January-2020] (2019).

V. D. Veksler, N. Buchler, B. E. Ho_man, D. N. Cassenti, C. Sample, S. Sugrim, Simulations in cyber-security: A review of cognitive modelling of network attackers, defenders, and users, Frontiers in psychology 9 (2018) 691.

J. Davis, S. Magrath, A survey of cyber ranges and testbeds, Tech. rep., Defence Science and Technology Organisation, Edinburgh (Australia) (2013).

C. Siaterlis, A. P. Garcia, B. Genge, On the use of emulab testbeds for scientifically rigorous experiments, IEEE Communications Surveys & Tutorials 15(2) (2012) 929–942.

T. Benzel, The science of cyber security experimentation: the deter project, in: Proceedings of the 27th Annual Computer Security Applications Conference, 2011, pp. 137–148.

J. Mayo, R. Minnich, D. Rudish, R. Armstrong, Approaches for scalable modeling and emulation of cyber systems: Ldrd final report, Sandia report, SAND2009-6068, Sandia National Lab.

Rao, Nageswara, Wing, William, Carter, Steven, Wu, Chase. (2005). UltraScience Net: Network testbed for large-scale science applications. Communications Magazine, IEEE. 43. S12–S17. 10.1109/MCOM.2005.1541694.

Zheng, Xuan, Veeraraghavan, Malathi, Rao, Nageswara, Wu, Chase, Zhu, Michelle. (2005). CHEETAH: Circuit-Switched High-Speed End-to-End Transport Architecture Testbed. Communications Magazine, IEEE. 43. s11–s17. 10.1109/MCOM.2005.1497551.

Minakhmetov, Artur, Gutterman, Craig, Chen, Tingjun, Yu, Jiakai, Ware, Cédric, Iannone, Luigi, Kilper, Daniel, Zussman, Gil. (2020). Experiments on Cloud-RAN Wireless Handover using Optical Switching in a Dense Urban Testbed. Th2A.25. 10.1364/OFC.2020.Th2A.25.

Xiang, Zuo, Pandi, Sreekrishna, Cabrera Guerrero, Juan, Granelli, Fabrizio, Seeling, Patrick, Fitzek, Frank. (2021). An Open Source Testbed for Virtualized Communication Networks. IEEE Communications Magazine. 59. 77–83. 10.1109/MCOM.001.2000578.






Web Data Security: Emerging Cyber Defense Concepts and Challenges