Creation of testbed security using Cyber-Attacks

International Journal of Computer Science and Engineering
© 2017 by SSRG - IJCSE Journal
Volume 4 Issue 11
Year of Publication : 2017
Authors : Dr.S.Kannan, Mr.T.Pushparaj

How to Cite?

Dr.S.Kannan, Mr.T.Pushparaj, "Creation of testbed security using Cyber-Attacks," SSRG International Journal of Computer Science and Engineering , vol. 4,  no. 11, pp. 4-14, 2017. Crossref,


Cyber-attacks requiredevelop ubiquitous and in directionto face current threats it is significant to understand them. Studying occurrences in a real environment however, is not viable and therefore it is essential to find other approaches how to inspect the nature of attacks. Achievementcomplete knowledge about them assists designing of novel detection approaches as well as considerate their influence. In this paper we present a testbed framework to simulate attacks that permits to study a wide varietyof security states. The framework deliversanidea of real world preparations, yet it keeps full control over all the activities achieved within the simulated infrastructures. Developing the sandbox environment, it is conceivable to simulate numerous security attacks and assess their effects on real infrastructures. In this paper the design of the framework assistancesfrom IaaS clouds. Therefore its deployment does not needenthusiastic facilities and the testbed can be organized over variousmodern clouds. The feasibility of the testbed has been confirmed by a simulation of specific DDoS attack.


Testbed, cyber-attack, security, framework, security testbed.


[1] “Prolexic Quarterly Global DDoS Attack Report Q2 2013,” ProlexicTechnologies. Accessed on 6 Sep 2013. [Online]. Available: http://
[2] “Worldwide Infrastructure Security Report,” Arbor Networks. Volume VII, 2012. Accessed on 6 Sep 2013. [Online]. Available: http: // EN.pdf.
[3] K.pavya “Secure Multicast Transmission Scheme for Overlay Networks” Volume 12 Number 1 – Sep 2014.
[4] L. Chen, “Construction of the New Generation Network Security Testbed-Testbed@ TWISC: Integration and Implementation on Software Aspect,” 2008, Institute of Computer & Communication, National Cheng Kung University, Tainan, Taiwan.
[5] B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar, “An Integrated Experimental Environment for Distributed Systems and Networks,” Boston, MA, Dec. 2002, pp. 255–270.
[6] A. Arnes, P. Haas, G. Vigna, and R. A. Kemmerer, “Using a virtual security testbed for digital forensic reconstruction.” Journal in Computer Virology, vol. 2, no. 4, pp. 275–289, 2007.
[7] NikithaBhasu1 , Raju. K. Gopal, Enhanced Security Solution to Prevent Online Password Guessing Attacks, volume1 issue6 August 2014.
[8] K. Krishna, W. Sun, P. Rana, T. Li, and R. Sekar, “V-Net Lab: a cost effective platform to support course projects in computer security,” in Proceedings of 9th Colloquium for Information Systems Security Education, 2005.
[9] D. Duchamp and G. De Angelis, “A hypervisor based security testbed,” in Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007, ser. DETER. Berkeley, CA, USA: USENIX Association, 2007.
[10] Open vSwitch, “Open vSwitch: An Open Virtual Switch,” accessed on 30 August 2013. [Online]. Available:
[11] M.Priyanka ,G.PremaPriya, Dectecting the Data Injection Attack Through Multiple Relay Network using the Security Code, volume 2 issue 4 April 2015.
[12] P. Velan, T. Jirsik, and P. Cˇ eleda, “Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement,” in Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8115, T. Bauschert, Ed. Heidelberg: Springer Berlin / Heidelberg, 2013, pp. 136–147.
[13] P. Cˇ eleda, P. Velan, M. Rabek, R. Hofstede, and A. Pras, “Large-Scale Geolocation for NetFlow,” in IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). Ghent, Belgium: IEEE Xplore Digital Library, 2013, pp. 1015–1020.
[14] Sujee.R1 , Kannammal.K.E, Routing protocols based on network structure in wireless sensor networks -A survey, volume 2 issue 4 April 2015.
[15] “Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information,” RFC 5101 (Proposed Standard), Internet Engineering Task Force, 2008.
[16] S.Kokila1 , T. Princess Raichel, Software as a Service, a Detailed Study on Challenges and Security Threats, – volume 2 issue 12 December 2015.
[17] L. Hellemons, L. Hendriks, R. Hofstede, A. Sperotto, R. Sadre, and A. Pras, “SSHCure: A Flow-Based SSH Intrusion Detection System,” in Dependable Networks and Services, ser. Lecture Notes in Computer Science, R. Sadre, J. Novotny´, P. Cˇ eleda, M. Waldburger, and B. Stiller,Eds. Springer Berlin Heidelberg, 2012, vol. 7279, pp. 86–97.
[18] R. Moreno-Vozmediano, R. S. Montero, and I. M. Llorente, “IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures,” Computer, vol. 45, no. 12, pp. 65–72, 2012.
[19] S. Shekyan, “slowhttptest - Application Layer DoS attack simulator,” accessed on 8 August 2013. [Online]. Available:
[20] A. Abdulmohsen., Z. Tari., I. Khalil., and A. Fahad., SCADAVT-A framework for SCADA security testbed based on virtualization technology, Proceedings of the 38th IEEE Conference on Local Computer Networks (LCN), pp639-646, 2013.
[21] L. Topham, K. Kifayat, Y. A. Younis, Q. Shi and B. Askwith, Cyber Security Teaching and Learning Laboratories: A Survey, Information & Security: An International Journal, vol. 35, 2016.
[22] D. Lewis, The pedagogical benefits and pitfalls of virtual tools for teaching and learning laboratory practices in the Biological Sciences, HE Academy, 2014.
[23] L. H. de Melo Leite, L. de Errico, and W. do Couto Boaventura, Criteria for the selection of communication infrastructure applied to power distribution automation, Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies (ISGT Latin America), pp. 1–8, 2013. [24] O. Gerstel, AControl Architectures for Multi-Layer Networking: Distributed, centralized, or something in between? Optical Fiber Communications Conference and Exhibition (OFC), pp 1-16, 2015.
[25] C. Esposito, D. Cotroneo, R. Barbosa, and N. Silva, Qualification and Selection of Off-the-Shelf Components for Safety Critical Systems: A Systematic Approach, Proceedings of the Fifth Latin-American Symposium on Dependable Computing Workshops, pp. 52–57, 2011.
[26] V. Urias, B. Van Leeuwen, and B. Richardson, Supervisory Command and Data Acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed, Proceedings of the IEEE Military Communications Conference, (MILCOM), pp. 1–8, 2012. 
[27] Z. Liu., D. Li., L. Yun., and S. Xu., An assessment method for reliability of distributed control system, Proceedings of the IEEE International Conference on Information and Automation, pp. 1300-1304, 2015. 
[28] H. Fayyaz Abbasi., N. Iqbal., M. Rehan, Distributed Robust Adaptive Observer-Based Controller for Distributed Control Systems with Lipschitz Nonlinearities and Time Delays, Proceedings of the 13th International Conference on Frontiers of Information Technology (FIT), pp. 185–192, 2015. 
[29] J. Adrian Ruiz Carmona., J. César Muñoz Benítez and J. L. García-Gervacio., SCADA system design: A proposal for optimizing a production line, Proceedings of the International Conference on Electronics, Communications and Computers (CONIELECOMP), pp. 192-197, 2016. 
[30] R. Gao and C. Hwa Chang, A scalable and flexible communication protocol in a heterogeneous network, Proceedings of the 13th International Conference on Computer and Information Science (ICIS), pp 49-52, 2014. 
[31] Y. Zhang., L. Wang., Y. Xiang and C. Ten, Inclusion of SCADA Cyber Vulnerability in Power System Reliability Assessment Considering Optimal Resources Allocation. IEEE Transactions on Power Systems, Vol:PP, No 99, pp 1-16, 2016. 
[32] Q. Yan., F. R. Yu., Q. Gong., and J. Li., Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges, IEEE Communications Surveys & Tutorials, Vol. 18 No. 1, pp. 602–622, 2015.
[33] A. Sahi Khader., and D. Lai., Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol, Proceedings of the 22nd International Conference on Telecommunications (ICT), pp. 204–208, 2015. 
[34] R. Divya., and S. Muthukumarasamy., An impervious QR-based visual authentication protocols to prevent black-bag cryptanalysis, Proceedings of 9th IEEE International Conference on Intelligent Systems and Control (ISCO), pp. 1–6, 2015.
[35] T. Benzel, R. Braden, D. Kim and C. Neuman, Experience with DETER: a testbed for security research, in Proceedings of the 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2014.
[36] Z. L. H. Wei, G. Yajuan, and C. Hao, Research on information security testing technology for smart Substations, in Proceedings of the International Conference on Power System Technology (POWERCON), pp. 2492–2497, 2014.
[37] M. Ficco, G. Avolio, L. Battaglia, and V. Manetti, Hybrid Simulation of Distributed Large-Scale Critical Infrastructures, Intell. Netw. Collab. Syst., pp. 616–621, 2014.