Paradigm Shift in Adaptive Cyber Defense for Securing the Web Data: The Future Ahead


  • Shishir Kumar Shandilya 1)School of Data Science & Forecasting, Devi Ahilya University, Indore – MP, India 2)School of Computing Science & Engineering, VIT Bhopal University, India



Web Data Security, Security Risks, Nature-inspired Cyber Security, Cyber Threat Analysis


Web Applications are becoming more sophisticated to cater the ever-growing demand of data processing and computing. Fast technological advancements in web engineering not only facilitate data intensive and high-performance computing, but also raise serious concerns on security. Cyber threats are also ramping up at the equal pace and attackers are now more organised and equipped with high-end servers. The Data over Web needs to be more authenticated and reliable. Data Provenance-aware methods are capable of identification of data breaches and manipulation through various attacks. They analyse underlying data for the potential threats to ensure protection against various attacks. Cyber Security Practitioners are witnessing severe issues in securing the Web Data and applications as the security risks are growing rapidly due to the sudden eruption in internet usage due to the pandemic in the last few years. People and organisations are relying more on Internet and web applications than ever before. The efforts for securing the web data on such a massive scale is premature to counter the ever-evolving attack attempts. Nature-inspired Cyber Security (NICS) facilitates the development and implementation of robust defensive mechanisms which are more adaptive and highly tolerant to online malicious programs. These methods are also capable of dealing with the common algorithmic issues like incompleteness and uncertainty of information and to provide a high-level security mechanism by effectively implementing the bio-inspired methodologies like deception, and camouflage etc. This article will attempt to explore the effectiveness of NICS in web data and application security to provide smart security methods.


Download data is not yet available.

Author Biography

Shishir Kumar Shandilya, 1)School of Data Science & Forecasting, Devi Ahilya University, Indore – MP, India 2)School of Computing Science & Engineering, VIT Bhopal University, India

Shishir Kumar Shandilya is the Deputy Director of SECURE – Centre of Excellence in Cyber Security and Division Head of Cyber Security and Digital Forensics at VIT Bhopal University. He is working as a Principal Consultant to the Govt. of India for Technology Development and Assessment in Cyber Security. He also holds the position of Executive Director of National Cyber Defense Research Centre, New Delhi. He is a Visiting Researcher at Liverpool Hope University-United Kingdom, a Cambridge University Certified Professional Teacher and Trainer, ACM Distinguished Speaker and a Senior Member of IEEE. He is a NASSCOM Certified Master Trainer for Security Analyst SOC (SSC/Q0909: NVEQF Level 7) and an Academic Advisor to National Cyber Safety and Security Standards, New Delhi. He has received the IDA Teaching Excellence Award for distinctive use of technology in Teaching by Indian Didactics Association, Bangalore (2016) and Young Scientist Award for two consecutive years, 2005 and 2006, by Indian Science Congress and MP Council of Science and Technology. He has seven books published by Springer Nature-Singapore, IGI-USA, River-Denmark and Prentice Hall of India. His recently published book is on Advances in Cyber Security Analytics and Decision Systems by Springer.


SK Shandilya, S Upadhyay, A Kumar, AK Nagar, AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis, Future Generation Computer Systems, Elsevier, 2022

SK Shandilya, Design and Analysis of NICS Based Web Attack Detection for Advanced Intrusion Detection System, Iberoamerican Knowledge Graphs and Semantic Web, Springer, 2021

Gautam, R., Kaur, P. & Sharma, M. A comprehensive review on nature inspired computing algorithms for the diagnosis of chronic disorders in human beings. Prog Artificial Intelligence 8, 401–424, 2019

Michael Warner. Cybersecurity: A pre-history. Intelligence and National Security, 27, 2012

Hong S. Choi M. S. Lee S. J. Kim T. W. Lee S. W. Ha B. N. Lim, I. H. Security protocols against cyber-attacks in the distribution automation system. IEEE Transactions on Power Delivery, 25(1):448–455, 2010

Robert Dewar. The “triptych of cyber security”: A classification of active cyber defense. International Conference on Cyber Conflict, CYCON, pages 7–21, 2014

Dewar, Robert, Active Cyber Defense, 2017

Ricardo Neisse, Gary Steri, Igor Nai Fovino, and Gianmarco Baldini. Seckit: A model-based security toolkit for the internet of things. Computers Security, 58, 2015

Neal Wagner, Cem Ş. Sahin, Jaime Pena, and William W. Streilein. Automatic generation of cyber architectures optimized for security, cost, and mission performance: A nature-inspired approach. pages 1–25, 2019

Vajiheh Hajisalem and Shahram Babaie. A hybrid intrusion detection system based on abc-afs algorithm for misuse and anomaly detection. Computer Networks, 136, 02 2018





Advances in Web Data Provenance for Mitigation of Web Application Security Risks