Abstract: This paper presents a modular approach to facilitate the design and creation of vulnerable testbed devices to perform penetration tests and generate data sets for future work on anomaly ...