0% found this document useful (0 votes)
63 views17 pages

Present and Future of Network Security Monitoring

Uploaded by

Praful
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views17 pages

Present and Future of Network Security Monitoring

Uploaded by

Praful
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Received February 26, 2021, accepted March 13, 2021, date of publication March 18, 2021, date of current

version August 18, 2021.


Digital Object Identifier 10.1109/ACCESS.2021.3067106

Present and Future of Network Security


Monitoring
MARTA FUENTES-GARCÍA 1, JOSÉ CAMACHO 2, AND GABRIEL MACIÁ-FERNÁNDEZ 2
1 FundaciónI+D del Software Libre (Fidesol), 18016 Granada, Spain
2 Department of Signal Theory, Telematics and Communications, CITIC-UGR, University of Granada, 18071 Granada, Spain

Corresponding author: Marta Fuentes-García ([email protected])


This work was funded by the Ministry of Science and Innovation through CDTI through the Ayudas Cervera para Centros Tecnológicos
grant of the Spanish Centre for the Development of Industrial Technology (CDTI) through the Project EGIDA under Grant
CER-20191012, and in part by the Spanish Ministry of Economy and Competitiveness and European Regional Development Fund (ERDF)
funds under Project TIN2017-83494-R.

ABSTRACT Network Security Monitoring (NSM) is a popular term to refer to the detection of security
incidents by monitoring the network events. An NSM system is central for the security of current networks,
given the escalation in sophistication of cyberwarfare. In this paper, we review the state-of-the-art in NSM,
and derive a new taxonomy of the functionalities and modules in an NSM system. This taxonomy is useful
to assess current NSM deployments and tools for both researchers and practitioners. We organize a list of
popular tools according to this new taxonomy, and identify challenges in the application of NSM in modern
network deployments, like Software Defined Network (SDN) and Internet of Things (IoT).

INDEX TERMS Network security, NSM, security monitoring, incident detection, incident response, SDN,
IoT.

I. INTRODUCTION ponents. We also look over some of the existing solutions


Although most of the efforts in network security are still according to this taxonomy. Finally, we analyze the most
focused on preventing attacks, solutions and techniques relevant trends in modern networks, the (new) challenges they
based in detection and response are gaining more and pose, and how they are tackled from the NSM perspective.
more relevance [1], [2]. There is a general belief within We evaluate the use of the aforementioned traditional tools
the Information Technology (IT) Security community that, for NSM to modern networks, as well as we review existing
sooner or later, prevention measures are surpassed by attack- solutions and novel works for this new framework. Thus,
ers. At that point, detection and response mechanisms need the main contributions of this work are:
to be applied [3]. Network Security Monitoring (NSM) is one • A modular taxonomy for detection and response sys-
of the most relevant approaches for network security [4]. tems according to the NSM philosophy.
The NSM cycle can be characterized by four phases [4], • A classification of some for the trade solutions follow-
[5]: 1) Monitoring, 2) Detection, 3) Forensics/Diagnosis, and ing the proposed taxonomy.
4) Response/Recovery. Its goal is to monitor the state of a • An evaluation on the application of NSM for modern
given network to detect abnormal events and, when detected, networks.
to manage them in a timely manner. This is a significant • New challenges in network security for new communi-
challenge, since communication networks produce a huge cation paradigms, according to the proposed taxonomy.
volume of data at a high pace, following the definition of a
Big Data problem [6]. This is even a more difficult task if This paper is addressed from a different and complemen-
we consider the pervasive nature of present and upcoming tary standpoint to previous works [9]–[14], which only cover
scenarios, such as 5G and the IoT, or the adaptation to new partially the NSM cycle and do not tackle it from a module
network technologies (e.g., SDN) [7], [8]. taxonomy perspective, as it is proposed in this paper. This
In this paper, we review the state-of-the-art in NSM, aiming modular taxonomy aims helping researchers and practitioners
to provide a taxonomy and a unified description of its com- to understand features, benefits and lacks in current detection
and response for network security.
The associate editor coordinating the review of this manuscript and The rest of the paper is organized as follows: Section II
approving it for publication was Moayad Aloqaily . introduces a taxonomy which describes the main components
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.
112744 For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/ VOLUME 9, 2021
M. Fuentes-García et al.: Present and Future of NSM

and architecture of an NSM system. Section III includes a these complex sensors are complete security tools which
review of some of the best known commercial and open output is captured and utilized as a part of another top system,
source available tools, following the proposed taxonomy. we call them security sensors.
Section IV evaluates the benefits and challenges of applying
NSM to modern networks. Finally, Section V presents the B. PARSER MODULE
main conclusions derived from this work. NSM deployments with numerous and disparate sensors result
in massive databases from which detecting when and where
II. MODULAR TAXONOMY OF A NETWORK SECURITY there is an attack is a challenging task. Besides, the data
MONITORING SYSTEM format varies widely among the set of sensors [15], [16].
An NSM system should be able to provide traceability of the For this reason, after data collection, data sources need to be
activities and processes that take place in the network and processed to become fit for purpose.
subsystems under monitoring. To achieve this goal, a typi- In spite of the attempts to provide unification models for
cal NSM architecture is composed of different software and the exchange of alert information, such as Intrusion Detection
hardware elements that are distributed thorough the network. Message Exchange Format (IDMEF) [15], [17], one of the
These elements send information about network events to a main problems in data collection is that manufacturers, when
centralized point, where they are recorded and analyzed. designing the devices and software, do not usually follow
A comprehensive review on the most used NSM systems has a standardized format for information logging. This implies
leaded us to propose a taxonomy of the NSM functionalities. the need of a parsing process. Parsing is the process of
Most of these solutions implement at least one of these func- identifying and extracting individual parts that compose a log
tionalities: sensor, parser, integrator, detector, inspector, and to obtain a logical and organized data structure [15]. Thus,
actuator. parsing allows to extract useful information from the data and
• Sensor collects data from a network subsystem. Result- homogenize different sources to a common format [15], [17].
ing data are in the form of records or logs. For instance, IP addresses can be located in different parts of
• Parser transforms data format. the log file depending on the sensor. In such case, the parsing
• Integrator combines multiple sources of data into a process is useful to identify the IP addresses on each available
single data stream. log and match them in order to combine different sources in a
• Detector identifies anomalous events/records in a data meaningful way. This process is needed to feed detection and
stream. visualization tools that require structured information.1
• Inspector allows data exploration. The parsing process can be performed ad-hoc (by secu-
• Actuator performs automatic actions on the net- rity operators), and it can be often implemented either as a
work/subsystem configuration. separate module or as a part of the sensor or the integra-
tor modules. On the other hand, parsing can be performed
These are inherently modular systems, which make it eas-
either scripting-based or software-based. The former refers
ier the scalability to build more complex systems. This is
to Linux commands and to scripting-based programming (e.g.
achieved by combining the outputs of different modules. For
python or perl), while the latter refers to programs that have
example, the output of an integrator (A) could be the input
been developed to optimize the extraction of information
for a second integrator (B), which is also combined with a
from complex data [20]–[22].
detector (C), thus creating a hierarchical detection structure.
Finally, there are some challenges related to the parsing,
In addition, not all NSM systems implement all functionali-
namely: i) sensitivity of the parsing code to format changes
ties.
in the sensors, usually caused by updates in their specifica-
Sensor, parser and integrator are usually enclosed in the
tions or even their functionalities; ii) scarcity of information
monitoring phase, while the rest of the modules have a one-
about the format used by each manufacturer; and iii) lack
to-one relation with the remaining steps in the NSM cycle
of synchronization in the timestamp of sensors, which can
(detection, forensics and response). The NSM modules are
be especially challenging if they are distributed in different
described in the following paragraphs.
countries with distinct time zones and do not make use of syn-
chronization services like Network Time Protocol (NTP) [15].
A. SENSOR MODULE
A sensor is a software agent and/or hardware appliance that
collects data from the network, generating logs or records to
be analyzed by a security team. This module usually includes 1 Structured data refers to those data that can be well organized in fields

the functionality to send the collected data to a centralized and follow a specific structure (e.g. ZIP code). They are suitable for relational
databases. Unstructured data refers to those data that do not follow a
location, where such information can be accessed and ana- specific format and have not been processed yet. These come from variate
lyzed. sources and are heterogeneous data, which can be images, post from social
More simple sensors, like traffic sniffers, are composed of networks, or sensor data, among others. Unstructured data are not suitable for
relational databases. Semi-structured data refers to data that are typically
a collector module alone. Other more complex sensors often unstructured but contain some metadata or tags that allow to describe them
include some form of parser and/or detection module. When (e.g. XML). They are not suitable for relational databases [18], [19].

VOLUME 9, 2021 112745


M. Fuentes-García et al.: Present and Future of NSM

C. INTEGRATOR MODULE D. DETECTOR MODULE


Integrators combine the data collected by the sensors to This is an essential part in an NSM system. Detectors are
extend their semantic information. Different approaches can actually engines which goal is to detect suspicious behavior in
be implemented in form of integration engines. The integra- the data. The volume of data to be analyzed can be reduced by
tion module can include one or more integration engines that filtering or grouping data, by feature extraction (considering
work complementary together to make disparate data become only those features that are of interest) [28], [29], or by using
useful information. The following paragraphs describe some a correlation engine [16], [17], [23].
of the most extended approaches to implement data integra- Detection engines are usually classified in signature-
tion. based, if they use a library of patterns (e.g. rules or traces
Having redundant data is a frequent problem when data are of code) to detect known attacks, and data-driven, if they
collected from different data sources, which can be solved use models of normal behavior to detect abnormal activi-
by correlating events. The term correlation in IT Security is ties [5], [28]–[31]. The latter can also be i) statistical-based,
applied to find connections among distinct data sources or IT ii) knowledge-based, and iii) ML-based [29], [30].
Security events.2 Correlating events may be particularly use- In general, the main drawbacks of signature-based detec-
ful when i) they are duplicated due to different nodes are gen- tion are the need for frequent updates of the signature
erating events and/or alerts related to the same incident, or ii) database, and the inability to detect zero-day attacks [31].
they are related to the same incident in the same sampling When data-driven detection is ML-based, supervised methods
time period and can be unified into a single event. Like this, cannot detect zero-day attacks either, although they have a
event correlation provides the following benefits: i) extending high performance detecting known attacks. Finally, unsu-
the semantic information by considering the context of the pervised detection can in principle detect zero-day attacks,
event, ii) reducing the volume of data to be analyzed, and iii) although it may generate many false alarms. Thus, a main
escalating and prioritizing important events, thus reducing challenge of unsupervised detection is to reduce the amount
the number of false positives. This yields useful information of false alarms, which can be performed by prioritizing and/or
for the detection of attacks or abnormal activities, especially visualizing the events [15], [32]. This can also be achieved
when they affect different assets [16], [17], [23]. thanks to existing lists that contain events likely reported as
Another mechanism that allows data integration is pivot- false positives, which allow to avoid escalating those events
ing. Pivoting refers to the ability of going from one data as alarms [5], [33], [34].
source to another, which is usually performed by using links In general terms, the number of security events, the veloc-
to navigate among windows that show related information. ity, and the pace in which they are generated is so high
Thus, if there is an incident, the security operator will be that security operators usually cannot handle all of them,
able to investigate it and obtain contextual information. Let and proper prioritization/triaging turns mandatory [15]. This
us imagine that there is a record that has been signaled as can be achieved by defining metrics going beyond those
anomalous. By means of pivoting, it is possible to jump from traditionally used for the capability of detection (e.g. Receiver
the record to another window with detailed information of the Operating Characteristics (ROC) or Area Under the Curve
related IPs, such as reputation information, whois, or domain (AUC)). These metrics should provide information about the
names. Thus, pivoting reduces considerably the time needed importance of an anomaly, rather than only detecting whether
to investigate a security incident (especially if the pivoting is a given event is anomalous or net [35].
graphically assisted) [24].
Finally, a further form of integration is the one used when
Machine Learning (ML) techniques are applied over security E. INSPECTOR MODULE
data. In the context of ML, integration is often referred to The NSM cycle includes the diagnosis of the detected IT
as data fusion. Fusion allows to obtain a single stream of Security incidents. This step helps the analysts to identify
data from several disparate sources that can be dealt with the root causes of the incident (forensics) so that problems
properly by the rest of the modules. Data fusion is frequently within the network can be timely identified and corrected
classified in: low, middle and high, depending on how the for [35], [36]. Besides, when an IT Security incident takes
sequence of data fusion and modeling is done through ML. place, it is advisable recording the current state of the system
If data fusion is performed from raw data, before modeling, and network. This may involve saving configurations, logs,
then it is called low-level. If it is done after some form of users logged in the system or processes that where running
data transformation or feature extraction, then it is called when the incident occurred. The inspector module is respon-
middle-level. If data fusion takes place after ML modeling sible of performing these tasks. Additionally, it is desirable
and combines the output of several ML techniques, is called that this module includes a diagnosis engine, which can help,
high-level [25]–[27]. in combination with the detection component, to prioritize
and triage the events [37].
Diagnosis is usually related to forensics tasks, where the
2 Note that the term correlation in IT security has a different meaning to origin of the alarm needs to be found [38]. To do this, we need
the traditional one in statistics. to find the location of the incident, which is related to both

112746 VOLUME 9, 2021


M. Fuentes-García et al.: Present and Future of NSM

the physical origin of the alarm (e.g. devices or sensors) and single-module solutions. Then, we present some examples
to the timing in which the incident took place (e.g. when it of network security products that implement several NSM
started and its extension in time). This is a difficult task that modules, namely multi-module solutions. Finally, as a part
is usually performed manually by security operators [38], of the multi-module solutions, we include a collection of
[39], although some works have proposed ML-based solu- security tools that may be also considered as security sensors.
tions to tackle this problem [40]–[44]. For example, authors
in [40] propose two solutions: the first one is model-based and A. SINGLE-MODULE SOLUTIONS
the second one is data-driven. Diagnosis is also dealt in the In this part of the section, we enumerate different types of
context of black box ML by using gradients in an unsupervised single sensors, which can be classified according to the type
way [41]. These methods are frequently complex, since they and origin of data that they collect in: i) Network Traffic Sen-
require a big effort to implement and are hard to interpret for sors, and ii) Log and State Sensors. Then, we present different
an analyst. Interpretation becomes easier if linear methods are types of single parsers, which can be classified according to
applied, such as Principal Component Analysis (PCA) [42], their way of working in: i) Command-based Parsers, and ii)
[43]. In any case, using linear methods for diagnosis simpli- Software-based Parsers.
fies the definition of the inspector module, which allows to
identify the variables related to a previously detected incident. 1) NETWORK TRAFFIC SENSORS
Traffic data can be collected directly from the network in
F. ACTUATOR MODULE different formats. Some of these formats are packets, traffic
After an IT Security incident takes place and it is detected by flows, and traffic statistics. All of them are described in the
the NSM system, the response and recovery of the system are next paragraphs.
of main importance. The aim of this step is recovering the
affected systems to a secure state to minimize loses and dam- PACKETS
ages suffered by the compromised organization. This stage Each communication that uses the TCP/IP protocol stack is
can be carried out manually, by security operators; or auto- split into packets, which are individually routed to their des-
matically, by using an actuator module that implements tination [4], [5], [33]. Sensors usually capture packets using
response policies and actions against certain events [3], [45], a programming library such as libpcap [51] and store them
[46]. Some authors [45] recommend following an OODA for later analysis. The most common format for the storage
(Observe, Orient, Decide, Act) loop, which allows facing the is pcap, a binary format that can be read by almost any
attacks efficiently. This cycle is closely related to the NSM sniffer and traffic analysis tool [4], [5], [15], [32]. There exist
philosophy. several tools for collecting network traffic. The most popular
Typical response actions are discarding or modifying traf- are Wireshark [32], [52] and tcpdump [51], which listen in a
fic that is related to the attack [34], as well as creating and network interface and display or store the collected network
restoring security backups [45]–[47]. In addition, reducing traffic. They analyze the raw data from complete packets,
permissions and/or changing passwords for involved users displaying their information in an understandable format to
in the affected network, as well as isolating and cleaning users. Wireshark offers a Graphical User Interface (GUI) to
infected hardware and software can be other typical responses explore packets, together with a command line tool, tshark,
after an IT Security Incident is detected [47], [48]. Another while tcpdump only offers command line options [4], [5],
advisable action (which is also related to the inspector mod- [15], [24], [32], [33]. Tshark provides a more powerful and
ule) is to register and analyze all events, records and acts complex syntax to analyze traffic than tcpdump. However,
related to the incident, so that similar problems can be in practice, tcpdump is the most used since it is more simple.
detected and efficiently dealt with, or even prevented, in the Wireshark can also be employed to obtain flows, sessions
future [48], [49]. and traffic statistics [52].
Finally, one of the most important actions after detecting The main drawback of capturing packets is that it implies a
an IT Security Incident is to notify it to the stakeholders huge volume of information, rendering it impractical for long
(e.g. workers, clients and/or corresponding authorities) so that captures. An alternative solution is to filter data to reduce the
they are aware of the issue and can take additional actions if size of the capture [32].
needed [48], [50]. Yet, this action should not be considered
as a single mechanism of response, but a complement to TRAFFIC FLOWS
be applied in combination with any of the aforementioned The information extracted from traffic flows provides a
response actions. higher abstraction level, reducing the volume of data stored in
comparison to packet captures, while still allowing a consid-
III. NSM SOLUTIONS IN THE MARKET erable amount of information. Traffic flows are also known
This section reviews some of the tools for the trade, fol- as traffic sessions. One of the most extended protocols to
lowing the modular taxonomy proposed in this paper. This capture flows is NetFlow, which was developed by Cisco
classification starts with sensors and parsers, which are often Systems to extract and send information of traffic flows [53].
found implemented in form of individual solutions, namely Although NetFlow was not originally developed for IT

VOLUME 9, 2021 112747


M. Fuentes-García et al.: Present and Future of NSM

Security, it is widely used in this context, since it provides a server. It can provide data about the configuration of the
highly valuable summary of the flows. Two of the most rele- websites as well as the databases, but also statistics about
vant tools used for collecting and analyzing flows information access to web pages. On the other hand, Sendmail is a
are Argus and nfdump [32]. Argus collects and transforms Mail Transport Agent, which is in charge of routing the e-
session data [54], which are displayed and analyzed with the mails to their destination. Email logging data can be useful
Ra client [32], [55]. Nfdump is a set of tools (including to investigate whether an affected host had exchanged any
nfcapd and the homonym command nfdump) for collecting message with other machines before being compromised, and
and processing NetFlow data through the command line. the nature of such messages.
Nfcapd collects NetFlow data while nfdump reads the Application Log sensors allow anomaly detection, regis-
files stored by nfcapd using an analysis syntax similar to tration of system accesses (both successful and failed), and
that of tcpdump [32], [56]. prioritization in relation to the type of resource involved in an
anomaly. This information can be useful for the investigation
TRAFFIC STATISTICS after an IT Security incident is detected [5], [15].
This information is related to certain features of the net-
work traffic, such as traffic volume or type of traffic, among 3) COMMAND-BASED PARSERS
others. Statistics do not allow to perform a forensic anal- Command-based parsers are Linux commands that can be
ysis per se, but help security operators in their investi- used to find patterns matching with regular expressions.
gation, complementing the data collected by other tools. Depending on the selected command, they allow taking dif-
One of the most extended tools to gather traffic statistics ferent actions on the filtered data. Thus, they can be used to
from network interfaces is the Simple Network Manage- create scripts for data parsing. Some of the best known Linux
ment Packet (SNMP) [57]. SNMP is an application layer commands that allow parsing are awk, grep, or sed. [59], [60].
protocol that allows to retrieve and interchange management
information from network devices. This information can be 4) SOFTWARE-BASED PARSERS
collected using for example the Open SNMP3 distribution. Software-based parsers are programs that allow extracting
Wireshark and tshark can also be used to obtain traffic information from complex data. To do it, they look into
statistics. the data to extract patterns automatically. This is performed
by means of algorithms and configuration rules, rather than
2) LOGS AND STATE SENSORS only using regular expressions. Some examples of tools that
Logs and state sensors gather information from applica- implement the parser module are Logstash [61] and the
tions or operating systems, among others. These sensors can FCParser [22]. Logstash is part of the Elastic Stack [20],
be used either individually or to complement the information while the FCParser is a library for network data pars-
collected by other sensors that usually provide more detailed ing. Both tools can parse data from several and disparate
information. The sources include (but are not limited to): sources, including the transformation from unstructured data
network management protocols, such as SNMP; system logs, into structured data and the management of big data.
such as syslog, which can be captured with tools like
syslog [58]; or Application Logs obtained, for example, from B. MULTI-MODULE SOLUTIONS
Apache or sendmail. This section collects some network security tools that imple-
ment several NSM modules. Due to its growing importance in
SYSLOG the last years, we pay special attention to Intrusion Detection
This is a protocol implemented in the application layer to gen- Systems (IDSs) / Intrusion Prevention Systems (IPSs), Security
erate logs related to the activities in a system. This protocol Event Managements (SEMs) / Security Information and Event
records events, such as logins to a host or a server. This is Managements (SIEMs) systems, Universal Threat Manage-
also useful to launch alerts related to activities or errors in the ments (UTMs), and tool collections; including examples of
operating system or the hardware, among others. Considering both open source and commercial solutions. We also consider
the type of resource that generates a record, in combination to other well-known security tools that are interesting from the
the type of alert, it is possible to establish a scale of priorities, NSM perspective, since they might be also considered security
which is useful to help the security operators to manage such sensors.
alerts. Table 1 summarizes the studied solutions and the NSM
modules that they include. This table aims to provide a quick
APPLICATION LOGS insight into the main functionalities and features that the best
Each application service, such as web surfing or the e-mail, known NSM solutions can provide. The ’X’ is used to indicate
has its own format to record the logging information. Apache that the solution implements the corresponding component,
web server or Sendmail are only examples of applications while the ’-’ symbol is used to indicate that the corresponding
that can generate logs. Apache is the most extended web component is not implemented in the solution. The ’♦’ sym-
bol is used to denote that the solution does not implement that
3 https://sourceforge.net/projects/opensnmp/ component but there exist plugins to implement it. Finally,

112748 VOLUME 9, 2021


M. Fuentes-García et al.: Present and Future of NSM

the ’F’ symbol is used to point out that the solution integrates It also allows to configure firewall rules to block malicious
another tool to implement the corresponding component. network traffic, including specific IP addresses. OSSEC is
multi-platform, since it can be used in most of the operating
1) IDSs AND IPSs systems. Although this engine has some SIEM features, such
Intrusion Detection Systems (IDSs) are one of the most as allowing the correlation of logs from several devices and
used security tools. They are mainly composed of a sen- formats, and mechanisms for compliance of security policies,
sor, a parser, and a detection engine. When these systems it has been traditionally considered to be an IDS [67].
also allow to deploy defensive responses to attacks, i.e. they
include an actuator module, they are called Intrusion Pre- 2) SEM AND SIEM SYSTEMS
vention Systems (IPSs). Some of the IDSs have evolved to A Security Event Management (SEM) system is in charge
Security Event Management (SEM) systems, which include of ‘‘1the collection, analysis and escalation of indications
an integrator module to improve the capability of detection and warnings to detect and respond to intrusions’’ [24]. Its
by collecting data from different sources [32]. aim is to visualize and understand network data by using a
IDSs are systems that implement a set of techniques to single and unified tool that combines different data sources
detect suspicious activities (potential intrusions) by monitor- (integrator). For that purpose, a SEM allows pivoting among
ing and analyzing the events in a network or a device [28], different data sources to carry out data analysis and forensics,
[32], [34]. They are classified as Host IDS (HIDS) and Net- which reduces considerably the time needed to investigate
work IDS (NIDS) according to the origin of the collected a security incident (especially if the pivoting is graphically
data [31], [34], [62]. HIDSs are deployed in end systems assisted) [24]. One of the features that makes a SEM system to
(hosts) and monitor user activity and the behavior of internal be such a powerful tool is that it allows the visualization and
processes [5], [31], [33], [34]. NIDSs first collect data from prioritization of the events, thus helping security operators to
the network using any of the aforementioned network traffic interpret and understand the alarms [34], [68].
sensors; then, they analyze the data to find security viola- A Security Information and Event Management (SIEM)
tions. Regardless the type of IDS, once data are received and system can be described following the definition provided
identified as (potentially) harmful, the system alerts security by Gartner [68], [69] as a system that ‘‘analyzes event data
operators. in real time for early detection of targeted attacks and data
Since the best known IDSs are open source, we only include breaches, and collects, stores, investigates and reports on log
this category in our review. data for incident response, forensics and regulatory compli-
ance’’. SIEM systems are the combination of two different
SNORT systems: SEM and Security Information Management (SIM)
This is the most popular IDS, and it can be used also as a systems. The main difference in relation to the SEM is that
sniffer [34]. Snort is a signature-based NIDS, which allows a SIEM also performs reports and include features for regu-
port scanning, as well as registering and alerting for any latory compliance, while the SEM does not necessary do that
defined anomaly. In the latest releases, this IDS also permits (indeed, this is a functionality usually provided by the SIM
to define basic responses in form of rules that allow blocking module). SIEM are the most popular (and expensive) type of
network traffic related to a given alert [63]. Unified2 is integrator systems in the industry. Like SEMs systems, SIEMs
the output logging format generated by Snort. Logging can are usually composed of at least the following components:
be generated in three modes: packet logging, alert logging, sensor, parser, integrator, detector and inspector. They can
and true unified logging [64]. Packet logging is used for also include response modules.
packet captures while alert logging only registers IT Security We start this classification with a SEM and three SIEMs that
events. True unified logging allows recording both events are open source: Zeek, Prelude, Wazuh and OSSIM.
and packets.
ZEEK (Bro)
SURICATA Zeek was originally developed by Vern Paxson and Robin
Suricata is both a real-time network IDS and a network IPS. Sommer [70] as a research work called Bro. Now, it has
It monitors the network traffic and performs offline process- evolved and it is widely used by companies, as well as
ing of pcap files. Suricata is signature-based and provides research and educative organizations [70]. This is a complete
the output in standard formats, such as YAML or JSON, but it open source tool for NSM that permits both anomaly and
can also be configured to generate logs in Unified2 [65], signature based detection [32], [70]. Zeek collects network
[66]. traffic using libpcap. Then, the engine of events processes
the data, performing a passive analysis on such data. It also
OSSEC allows collection and analysis of sessions of particular ser-
This is an open source HIDS that performs log analysis, vices. In addition, Zeek can be programmed to take actions in
integrity checking, monitoring of Windows records, and the evaluation of events (e.g. to execute a program to provide
rootkit detection. In addition, OSSEC provides alerts and main- active response for the detected event) and offers forensics
tains a copy of the modified files to perform forensics tasks. capabilities thanks to its mechanism of event logging [70],

VOLUME 9, 2021 112749


M. Fuentes-García et al.: Present and Future of NSM

TABLE 1. NSM modules provided by the studied solutions. The ’X’ is used to indicate that the solution implements the corresponding component. The ’-’
symbol is used to denote that the corresponding component is not implemented in the solution. The ’♦’ symbol is used to point out that the solution
does not implement that component but there exist plugins to implement it. The ’F’ symbol is used to indicate that the solution integrates another tool
to implement the corresponding component.

[71]. Although it is usually included in the IDS classification, Thus, the capabilities of OSSIM include discovering assets,4
Zeek can be considered a SEM [4], [24], [70]. assessing vulnerabilities, intrusion detection, monitoring of
behavior, and correlation of events [78]. It integrates differ-
PRELUDE ent software modules to provide a complete NSM solution.
This is a SIEM for Linux that collects, normalizes, combines Among other tools, this solution includes both a host and a
and correlates security events. Prelude implements the IDMEF network IDS. The NIDS part provides intrusion detection and
standard format (RFC 4765) as a part of the parsing compo- network traffic scanning. It also looks for signatures of the
nent, so that it can read a wide range of log formats [72]. latest attacks, as well as for malware or other possible ways
In addition, it generates reports about events. Its interface of attempting to compromise the system. The HIDS analyzes
provides a forensic mode that allows to investigate data from the behavior and state of the system, alerting when it suspects
large periods [73]. Therefore, Prelude implements all the that there is something wrong. Similarly to other SIEMs, OSSIM
NSM components excepting the response module. This SIEM
allows to detect and prioritize the most important threats and
can be used in a commercial version, which prices are cus- anomalies [78].
tomized for each organization and depend on the volume of Commercial Tools
events [74]. This part of the section covers two examples of commercial
SIEM systems, both included in the Gartner’s ‘‘Magic Quad-
rant for Security Information and Event Management’’ for
WAZUH 2020 [79]. Magic quadrants assess the products in the market
This is a SIEM for signature-based intrusion detection, which according to a set of criteria, which are mainly the Ability to
was developed by the homonym company [75]. Wazuh is Execute and the Completeness of Vision. Ability to Execute
based in OSSEC and it is used in combination with the Elas- refers to the economic power of a vendor to implement rele-
tic Stack [21]. This allows the monitoring of the system vant functionalities, and Completeness of Vision can be seen
for security analysis, intrusion and vulnerability detection. as the ability to understand present and future needs of the
Furthermore, Wazuh provides response to security incidents, market. The Magic Quadrant of Gartner has four categories:
including integrity and compliance [75]. Thanks to the Elastic Leaders, Challengers, Visionaries and Niche Players. Lead-
Stack features [20], the parsing component is implemented. ers have both high ability to execute and completeness of
vision of the market, Challengers have high ability to execute
OSSIM but limited vision on the market, Visionaries have a good
This SIEM was developed by Alien Vault (AT&T Cyber- vision of the market but do not have competitive ability to
security since February 2019) [76], and it uses the Open execute, and Niche Players are focused in a small segment
Threat Exchange R (OTX R ) [77] threat intelligence module, of the market (or do not have a complete vision of it) and
which allows the users to contribute and receive updated have a limited ability to execute [80].
information in real-time about security information. OSSIM
allows the collection, normalization and correlation of events. 4 In the case of OSSIM, asset is referred to machines.

112750 VOLUME 9, 2021


M. Fuentes-García et al.: Present and Future of NSM

Some of the most highlighted SIEM, according to the Magic 2018 [89], [90]. Again, this quadrant assesses the UTMs in
Quadrant [79], are: Splunk and IBM (‘‘Leaders’’); AT&T the market according to the same criteria as for SIEM systems
Cybersecurity and FireEye (‘‘Niche Players’’); and LogPoint and classifies them in: Leaders, Challengers, Visionaries and
(the only one in the ‘‘Visionaries’’ category). Our classifica- Niche Players (recall Section III-B2).
tion covers Splunk and AT&T Cybersecurity. Some of the most highlighted UTM, according to the Magic
Quadrant [89], [90], are: Huawei and SonicWall (‘‘Chal-
SPLUNK lengers’’); Fortinet and Sophos (‘‘Leaders’’); Juniper Net-
This is a commercial SIEM, which performs network mon- works and Barracuda Networks (‘‘Niche Players’’); and
itoring and real-time data collection, parsing and correla- WatchGuard (the only one in the ‘‘Visionaries’’ category, and
tion. Splunk also allows incident management (e.g. running close to be a ‘‘Leader’’). Our classification covers Sophos,
a script or applying threat intelligence) and forensic analysis Barracuda Networks, and WatchGuard.
thanks to its mechanism of event correlation. It allows data
and event analysis, providing visibility and context of the BARRACUDA CloudGen FIREWALL
alerts. In addition, it uses Big Data techniques to integrate the This is a commercial UTM that provides intrusion detec-
data from the organization to be monitored (User Behavior tion and protection. CloudGen Firewall also protects against
Analytics), allowing to improve the intrusion detection by known attacks, such as Denial of Service (DoS) or botnet
using machine learning algorithms [81], [82]. Splunk is con- attacks. In addition, this solution enables authentication and
sidered as a Leader in the Gartner’s Magic Quadrant because VPN connection. Its firewall allows packet inspection and
it provides SIEM solutions that i) are compatible with other filtering [91]. CloudGen Firewall is classified as a Niche
different SIEM systems and scenarios and ii) are scalable and Player in the Gartner’s Magic Quadrant in 2018 [89].
allow performing a wide range of actions related to both log
management and response against IT security incidents (see WatchGuard
Gartner’s Magic Quadrant in [83]). This is a commercial UTM that provides intrusion detec-
tion and protection. WatchGuard correlates data from dif-
USM (AlienVault R UNIFIED SECURITY Management R ) ferent sources, which enhances its capability of detection
This is a commercial SIEM based in OSSIM, and it was also and response against threats, being also able of generating
developed by Alien Vault (AT&T Cybersecurity since Febru- reports. In addition, it provides an antivirus functionality
ary 2019) [76]. USM is a unified platform for threat detection and application control, which is related to user’s behavior.
and policy compliance (which is one of the main differences WatchGuard offers an Advanced Persistent Threat blocker
in relation to OSSIM, see [84] for more details), as well as inci- that allows detecting and acting against complex attacks, such
dent response. AlienVault USM Anywhere provides USM as as ransomware; and it also has a spam prevention functional-
a cloud service [76]. Although it does not provide an inspector ity [92]. WatchGuard is considered to be the only Visionary
module, it is possible to complete this part of the NSM cycle in the Gartner’s Magic Quadrant in 2018 [89].
by using the plug-in AlienApp [85]. USM is considered as
a Niche Players in the Gartner’s Magic Quadrant, since it SOPHOS
is focused in specific sectors (such as financial services and This is a commercial UTM that provides intrusion detec-
healthcare) that are usually Small and Medium Businesses tion and protection. Sophos allows discovering and acting
(see Gartner’s Magic Quadrant in [83]). against threats, which makes it possible mitigating the effect
of such threats. After Sophos detects an infected system,
3) UTMs it isolates that system. In addition, it provides mechanisms
This is a type of ‘‘multi-function network security product for remote access, such as VPNs. This solution also includes
used by small or midsize business’’ [86]. These devices have an advanced firewall to monitor traffic data and anti-spam
high level functionalities (multi-function gateway), which functionalities [93]. Sophos is classified as a Leader in the
can be, for example, a firewall in the application layer of the Gartner’s Magic Quadrant in 2018 [89].
TCP/IP and OSI models, Intrusion Prevention and Detection
(IPS and IDS), antivirus, anti-spam and anti-phishing [87], 4) TOOL COLLECTIONS
[88]. The main advantages of the UTMs are their reduced cost This type of network security tools are composed of a number
and complexity, while the drawbacks are that UTMs usually of disparate software solutions. Furthermore, since they are
have limited processing power, and they cannot correlate open source they are continuously evolving.
events.
Since these are hardware solutions, it is not possible to SGUIL
find open source implementations. Thus, we only include This is a set of open source tools for network security moni-
commercial tools in this part of the review. toring, which allows to collect, analyze, alert and respond to
This part of the section shows three examples of com- intrusions [4], [94]. Sguil provides a real-time interface and
mercial UTM systems, all of them included in the Gartner’s includes two IDSs [34], [94]. Some of the tools that compose
‘‘Magic Quadrant for Universal Threat Management’’ for Sguil are [94]:

VOLUME 9, 2021 112751


M. Fuentes-García et al.: Present and Future of NSM

• MySQL, as a database service. program for port scanning to evaluate the security of the
• Snort and Suricata, for network intrusion detection and operating systems, allowing to discover vulnerabilities and
scanning as well as packets logging and solving alerts. providing useful information about open ports and services.
Squert5 is an evolution of Sguil which also uses OSSEC Although Nmap was originally developed for Linux, it is
and Zeek for intrusion detection [95]. now multi-platform [4], [32], [33], [99]. Nessus is also a
• Tcpdump, to collect network traffic from the logs of the multi-platform program for vulnerability scanning in oper-
packets. ating systems. Originally, Nessus was open source, but
• Wireshark, to analyze the collected packets. now it is private software (although there are open-source
alternatives, such as OpenVAS (Open Vulnerability Assess-
SECURITY ONION ment Scanner) [101]). The vulnerability assessment analysis
This is a collection of open source tools, which is provided as usually starts with a port scanning, which can be done, for
a Linux distribution. Security Onion allows to monitor, record example, using Nmap. Once the open ports are discovered,
and manage logs, as well as to perform intrusion detection and Nessus sends a number of probes against such ports to
response against IT Security Incidents [96]. It implements all unveil existing vulnerabilities. The results can be exported to
the NSM modules. Some of the tools that compose Security different formats, such as plain text or XML [100].
Onion are [96]: Other useful resources that allow to obtain vulnerability
• Elastic Stack and Logstash, as a search and analysis data are the National Vulnerability Database (NVD) and
engine that also transform and centralize the data, pro- Common Vulnerabilities and Exposures (CVE) databases.
viding visualization functionalities and implementing NVD is a public service provided by the National Institute
the parsing module [21], [61], [97]. of Standards and Technology of the United States (NIST)
• Snort, Suricata and Zeek, for network intrusion detec- to enumerate and classify existing vulnerabilities in current
tion, scanning and issuing alerts, as well as packets software and hardware [32], [102]. CVE is another simi-
logging. lar service provided by the MITRE6 that also includes the
• Wazuh, for host intrusion detection. NVD [103]. These databases offer the most updated informa-
• Sguil, for network security monitoring and event drive tion about known vulnerabilities in operating systems and
analysis. applications/services, and their solution (if known). Vulner-
• Squert, to consult and visualize Sguil data. abilities are usually discovered either using any of the afore-
• Cyberchef, to encrypt, compress and analyze data. mentioned or similar tools.
• NetworkMiner, for forensic analysis.
FIM
5) OTHER WELL-KNOWN SECURITY TOOLS (Security FIM systems allow to detect changes in the files stored at
Sensors) the devices in relation to a base copy of such files. Some
In this section we have included some systems, resources, and of the parameters that are checked by a FIM are: i) the
tools that, from the NSM perspective, provide useful security modification/creation date, ii) the permissions of access and
information. Thus, although these are security tools by them- modification, and iii) the checksum (hash) of the contents.
selves, they also can be considered acting like security sensors One of the problems of this type of data source is the huge
as a part of more complex NSM systems (e.g. SIEM systems). volume of data and the number of false positives that it tends
to generate. One of the tools that implements FIM capabilities
FIREWALLS is OSSEC [67].
Firewall logs are one of the most useful security data
sources, since they provide information about each access ANTIVIRUS
(failed or successful, authorized or not) to the network. One These programs are used to detect and remove malware from
of the main advantages of firewalls is that they can be found computers. Antivirus software are usually signature and/or
in any network. We can find basic examples, such as the rule based, and they are designed to analyze computer files.
one provided as a part of Windows Defender in Windows They are not typically designed to work as sensors. Yet,
10 operating systems [98]; but also advanced firewalls, such sometimes it is possible to configure them for log gen-
as Sophos [93], which actually are enclosed in UTM solutions. eration, which makes them useful as security sensors for
NSM systems [104]–[108]. For example, Kaspersky has both
VULNERABILITY ASSESSMENT free and commercial antivirus [109]. The first one provides
Vulnerability assessment tools are run on the network and basic protection while the commercial version provides addi-
end systems. These tools unveil weaknesses and security tional tools such as VPN connection or password manage-
holes that may enable an unauthorized access to the system. ment. Another well-known example of antivirus is Windows
Two well-known tools for this purpose are Nmap [99] and Defender, which is included in Windows 10 operating sys-
Nessus [100]. Nmap (Network Mapper) is an open source tem [98].
5 http://www.squertproject.org/ 6 https://www.mitre.org/

112752 VOLUME 9, 2021


M. Fuentes-García et al.: Present and Future of NSM

THREAT INTELLIGENCE tion implements the corresponding component, while the ’-’
This is a mechanism, similar to a social network or RSS symbol is used to indicate that the corresponding component
feeds, which allows users to contribute and receive updated is either not implemented or its covering is not clear in the
information about security threats and/or issues. It allows solution.
sharing useful security information among organizations,
which can also be useful to enhance detection engines. For SDN
example, if an organization detects a new attack, the rest of The huge data volume derived from using mobile networks
organizations using threat intelligence are informed, allowing massively led to a new proposal for networks management
them to prevent or deal with the attack in a more efficient optimization in 2016: the softwarization and virtualization of
way. Furthermore, threat intelligence uses knowledge related networks (SDN and Network Function Virtualization (NFV),
to the organization, including context or risk indicators, but respectively) [114]. Yet, these new paradigms are at the same
also existing reports about previous attacks, among other time solution and problem from the security perspective. Like
data [110]. The goal of using information from the organi- this, adopting SDN and NFVs introduce new vulnerabilities and
zation is to foresee threats based in the previous experience, security requirements, being the availability one of the most
taking into account threats both inner or external organi- relevant [114], [116], [120], [126].
zation. Threat Intelligence tools are in charge of collecting A number of works tackle these new security issues
this information and generating reports or alarms that can be related to the SDN, some of them aiming to enhance the
integrated with other security mechanisms, such as SIEM sys- detection techniques or following a security monitoring
tems. Threat connect [111] and Cyber Threat Alliance [112] approach [116], [120], [121], [123], [124], [126]–[128],
are two commercial tools for threat intelligence, while Open [132]. In addition, Santos da Silva et al manifest the need
Threat Intelligence [77] and Collective Intelligent Frame- of human intervention during the monitoring cycle [120].
work [113] are examples of open source solutions. On the contrary, other authors are more focused in a complete
automation of the process, using deep learning to implement
IDSs to increase data correlation and to be able to detect
IV. NSM APPLICATION AND CHALLENGES FOR NEW
zero-day attacks [11], [121]. Finally, other authors follow
PARADIGMS IN COMMUNICATIONS NETWORKS
approaches such as malware monitoring [131] or Threat Intel-
5G networks and new communication paradigms, such as the
ligence for SDN [132].
Internet of Things (IoT) or cloud computing, make network
Additionally, it has been highlighted that it is needed to
management to be more complex [7], [114]–[118]. The wide
adapt traditional intrusion detection to virtualized networks,
adoption of the 5G leads to massive data generation, which is
more precisely, to SDN [116], [120]. In this sense, some of the
getting more and more increased at a high pace [7], [8], [114],
tools that where analyzed in Section III have been used in the
[119]. Big Data processing, as well as feature extraction and
SDN scope. For example, Snort is applied for intrusion and
data correlation are some of the main challenges affecting
Distributed DoS (DDoS) detection by different authors [122],
anomaly detection and, thus, intrusion detection, which are a
[124], [125]. On the other hand, Suricata is also used for
main part of the NSM philosophy. Some works tackle intrusion
intrusion detection in SDN [127], [128]. Finally, Barracuda,
detection in high-dimensional data from an anomaly detec-
Sophos and WatchGuard provide SD-WAN (SDN-Wide Area
tion perspective [8], [119].
Network) solutions [93], [129], [130], [144], [145].
In addition, distributed and decentralized networks are
present and future of technology. This implies numerous IoT AND IIoT
benefits but also new challenges, specially for network secu-
IoT is characterized by designing a myriad of devices/gadgets
rity. In this section, we focus on some of the most relevant
that can be connected anywhere to a network. These
communication models in the present: i) SDN, and ii) IoT/
devices range from smartphones to cars, but also include
Industrial IoT (IIoT). In addition, we review those tools that
daily objects, such as fridges or televisions, and products
were included in Section III and its potential use for each
in warehouses and stores. Nowadays, devices are hyper-
of the aforementioned modern networks. Finally, we identify
connected both in local environments (e.g. personal wear-
current research needs for the proposed modules in Section II.
ables or smart homes) and in wide environments (e.g.
smart cities) [146]. IoT networks are decentralized, which,
A. MULTI-MODULE NSM SOLUTIONS AND WORKS FOR in combination with its own nature, makes the tradi-
MODERN NETWORKS tional security requirements to be affected. There are a
This section lists and classifies a collection of security solu- number of challenges and requirements in IoT security
tions for modern network that cover one or more NSM mod- [147]–[152]. Similar to traditional networks, the most rel-
ules, following the proposed taxonomy. Table 2 summarizes evant requirements are related to privacy, confidentiality,
the reviewed solutions and the NSM modules that they include. integrity and availability. The latter is currently one of the
This table aims providing a quick insight into the main func- most challenging issues in network security [147]–[152]. In
tionalities and features that these works can cover from the general terms, the most important needs in IoT security are:
NSM perspective. The ’X’ is used to indicate that the solu- providing scalability, interoperability, managing Big Data,

VOLUME 9, 2021 112753


M. Fuentes-García et al.: Present and Future of NSM

TABLE 2. NSM solutions and works in modern networks. The ’X’ is used to indicate that the solution implements the corresponding component. The ’-’
symbol is used to point out that the corresponding component is not implemented in the solution.

tackling with restricted resources, and providing resilience analyzed in Section III, Barracuda is the only one that
and robustness [147]–[150], [152]. has an IoT version of its traditional product, CloudGen
All the aforementioned needs are extensible to the NSM Firewall [161].
philosophy. Furthermore, data integration and correlation are On the other hand, according to Gartner, one of the most
other important challenges from the NSM perspective [8], relevant global risks in the end of 2019 and the first quarter
[153]. Recently, some authors have pointed the need of of 2020 was derived from the convergence between physical
designing and implementing high-level SIEMs and effec- and cybernetic world. This connection is in part empowered
tive IDSs that can be adapted to IoT protocols [137], [152], by the massive IoT adoption. In March of 2020, this risk was
[154]–[156]. Most of research papers in recent years have relegated to a secondary place after the pandemic situation
been focused in the proposal of new IDSs and/or enhanc- was declared [162], [163]. Yet, there is still a high risk that
ing the detection methods [133], [135], [137]–[139], [157]. is greatly due to the wide adoption of IoT in different scopes
Additionally, some authors take explicitly into account the such as smart homes, e-health or smart cities. Besides, IoT
constraints in IoT resources in their IDS proposal [137]. has been successfully adopted in industry, which applica-
Other authors highlight the necessity of anomaly detection tion is called Industrial IoT (IIoT) [118], [146], [164]–[166].
and mitigation in IoT networks [156], [158], as well as This aims monitoring and controlling industrial processes to
the lack of IoT datasets for training and testing detection enhance their effectiveness and quality [164]. Thus, IIoT is of
algorithms [13], [141]. utmost importance in gas, petrol and energy industries (which
In relation to commercial tools, Bitdefender proposes an are also considered critical infrastructures); and it is gaining
IoT solution that provides different alternatives depending on relevance in other areas, such as agriculture and health [155],
the pricing [142]. These features range from ’Cloud Essen- [165]–[170]. Thus, IIoT can be considered to be one of the
tials’ (it only includes basic protection) to IoT ’Full Stack’ pillars of Industry 4.0 [118], [165], [167], [168].
(including, IDS and IPS, anomaly detection, and DDoS detec- IIoT inherits complexity and risks from IoT. Addition-
tion and protection among others) [142], [159]. This tool is ally, it has particular requirements that, sometimes, are
recommended by Kaspersky as an alternative option to their related to the deal with risks and lower them in critical
scan tool (in a Beta state since 2018) [106]. Finally, Avast infrastructures. Some of the highlighted requirements and
provides a monitoring solution for smart homes, which aims challenges are scalability, authentication, integrity, availabil-
to prevent, detect and contain security incidents related to all ity and resilience [118], [154], [155], [164], [167], [169],
the connected devices [143], [160]. [171]. Similar to what happens for IoT, most of research
Furthermore, some authors highlight that there is a works are focused in IDS proposals [12], [134], [153] and
need to adapt traditional security mechanisms to IoT net- attacks/anomaly detection (mainly ML-based) [136], [140],
works [147], [151]. In this sense, if we review the tools [172].

112754 VOLUME 9, 2021


M. Fuentes-García et al.: Present and Future of NSM

In relation to commercial tools, if we come back to the operators to understand the facts and make them more
tools in Section III, Splunk is the only SIEM that is explicitly efficient in their forensic work.
indicated for monitoring IIoT environments [173]. • Actuator Module. This module is taken into account
in many of the works under study, which define some
actions such as blocking malicious connections. The
B. CURRENT RESEARCH CHALLENGES FOR NSM main challenges for this component are defining and
We believe that NSM could benefit to each of the communica- implementing self-recovery mechanisms to make the
tion network areas under study, although there are still open communications networks resilient. This is specially
issues to tackle. Below, we summarize the main challenges important in critical systems, typically related to IIoT
that, to the best of our knowledge, still need further research environments.
work for each of the NSM modules identified in the taxonomy
proposed in Section II. Finally, scalability and compatibility with restricted
resources (the latter specially for IoT and IIoT) are common
• Sensor Module. This is a well-established component, issues that are open for each of these modules. In addition,
which is widely covered in the reviewed works. Most of solutions available in the market need to be updated in order
the individual sensors enumerated in Section III can be to overcome these challenges and provide modern solutions
used in modern networks together with new sensors that covering most of the NSM modules. If these solutions are
are implicit in the nature of some of them, such as IoT designed following this philosophy, they will be more scal-
and IIoT. able and it will be easier to complete and enhance them.
• Parser Module. This component is considered in some
of the studied works from the point of view of self-
feature extraction. In some cases, a unification and V. CONCLUSION
redundancy reduction is also performed. However, there In this paper, we review the state-of-the-art for Network
is still a research room, which should be focused towards Security Monitoring (NSM), providing an overall insight and
establishing a unified format for event logging and fea- a unified classification of its main components. Our taxon-
ture extraction from Big Data. omy classifies such components as sensors, parsers, inte-
• Integrator Module. This is one of the most important grators, detectors, inspectors and actuators. These modules
and useful NSM modules, since it allows aggregating can be combined in different ways, yielding a powerful
data from different sources. Integrating is even more and scalable architecture for incident detection. This work
relevant for modern communication paradigms, where highlights the strengths and weaknesses of the identified
a number of heterogeneous devices are sending and modules.
receiving information that needs to be unified for its We review existing solutions for NSM sensor and parser
monitoring and incident detection. Yet, only four of modules, which can be found individually in the market.
the studied works take into account this module in an Furthermore, we study some of the best known and widely
explicit manner. For this reason, finding a strategy to used multi-module NSM solutions, according to the proposed
integrate, aggregate and correlate different data sources taxonomy. The best known examples of these combinations
is still one of the main challenges for researchers. are IDSs/IPSs, SEMs/SIEMs and UTMs.
• Detection Module. Most of current research works are Finally, we assess the applicability of the NSM phi-
mainly focused in this module, aiming to find new ways losophy in modern communications networks. We focus
for applying ML algorithms and thus improving the capa- this evaluation in SDN and IoT/IIoT networks. Open issues
bility of anomalies and/or attacks detection. One of the and future research interests for each of the NSM mod-
main challenges for this component is Big Data process- ules in relation to new communications paradigms are
ing to create and apply detection models. Furthermore, summarized.
prioritizing alarms and reducing the number of false We believe this paper is of interest both for the research
positives are still open issues. community and security practitioners, since it helps to focus
• Inspector Module. This component aims to locate an the efforts of research and market solutions in a more effective
incident both physically and in time. This is even more manner. Furthermore, it allows the identification of tools and
important when we talk about decentralized networks methods that are available to collect and process network
(e.g. IoT), due to: i) the source of the event might not security data for incident detection.
be placed in the same location as the event, and ii) a To conclude, we believe that the security landscape for both
number of different devices are probably interchanging traditional and modern networks would be benefited from i)
information thorough the network. Yet, only two of the investigation and development of inspector and actuator
the reviewed works include an inspector module. This modules, which are the least developed solutions to date; and
component needs further research, not only to provide ii) the design of systems which include all the components
logs and store the state after an incident takes place, identified. In addition, it is still needed to provide efficient
but to make them interpretable. This will help security solutions that take into account the restricted resources in

VOLUME 9, 2021 112755


M. Fuentes-García et al.: Present and Future of NSM

IoT and IIoT, as well as improving the resilience in critical [8] S. Thudumu, P. Branch, J. Jin, and J. J. Singh, ‘‘A comprehensive survey
infrastructures. of anomaly detection techniques for high dimensional big data,’’ J. Big
Data, vol. 7, no. 1, 2020, Art. no. 42.
[9] H. Shiravi, A. Shiravi, and A. A. Ghorbani, ‘‘A survey of visualization
APPENDIX A systems for network security,’’ IEEE Trans. Vis. Comput. Graphics,
vol. 18, no. 8, pp. 1313–1329, Aug. 2012.
LIST OF ABBREVIATIONS
[10] I. Ghafir, V. Prenosil, J. Svoboda, and M. Hammoudeh, ‘‘A survey on net-
AUC Area Under the Curve work security monitoring systems,’’ in Proc. IEEE 4th Int. Conf. Future
CVE Common Vulnerabilities and Exposures Internet Things Cloud Workshops (FiCloudW), Aug. 2016, pp. 77–82.
DoS Denial of Service [11] T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho,
‘‘Deep learning approach for network intrusion detection in software
DDoS Distributed DoS defined networking,’’ in Proc. Int. Conf. Wireless Netw. Mobile Commun.
FIM File Integrity Monitoring (WINCOM), Oct. 2016, pp. 258–263.
GUI Graphical User Interface [12] S. Otoum, B. Kantarci, and H. T. Mouftah, ‘‘Detection of known and
unknown intrusive sensor behavior in critical applications,’’ IEEE Sensors
HIDS Host IDS Lett., vol. 1, no. 5, pp. 1–4, Oct. 2017.
IDMEF Intrusion Detection Message Exchange Format [13] M. A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, ‘‘Deep
IDS Intrusion Detection System learning for cyber security intrusion detection: Approaches, datasets,
IPS Intrusion Prevention System and comparative study,’’ J. Inf. Secur. Appl., vol. 50, Feb. 2020,
Art. no. 102419.
IoT Internet of Things [14] S. Sengupta, A. Chowdhary, A. Sabur, A. Alshamrani, D. Huang, and
IIoT Industrial IoT S. Kambhampati, ‘‘A survey of moving target defenses for network
IT Information Technology security,’’ IEEE Commun. Surveys Tuts., vol. 22, no. 3, pp. 1909–1941,
3rd Quart., 2020.
ML Machine Learning [15] R. Marty, Applied Security Visualization. Reading, MA, USA:
NFV Network Function Virtualization Addison-Wesley, 2010.
NIDS Network IDS [16] S. Salah, G. Maciá-Fernández, and J. E. Díaz-Verdejo, ‘‘Fusing informa-
tion from tickets and alerts to improve the incident resolution process,’’
NIST National Institute of Standards and Technology of Inf. Fusion, vol. 45, pp. 38–52, Jan. 2019.
the United States [17] S. Salah, G. Maciá-Fernández, and J. E. Díaz-Verdejo, ‘‘A model-based
NSM Network Security Monitoring survey of alert correlation techniques,’’ Comput. Netw., vol. 57, no. 5,
NTP Network Time Protocol pp. 1289–1317, Apr. 2013.
[18] Talend. (2021). Structured vs. Unstructured Data: A Complete Guide.
NVD National Vulnerability Database Accessed: Feb. 22, 2021. [Online]. Available: https://bit.ly/37C7DXg
OSSEC Open Source HIDS SECurity [19] MongoDB. (2021). Structured vs Unstructured Data. Accessed:
OSSIM Open Source Security Information Management Feb. 22, 2021. [Online]. Available: https://bit.ly/3uhVJeR
P2P Peer to Peer [20] Elastic Stack. (2020). Elastic Stack Features. Accessed: Sep. 11, 2020.
[Online]. Available: https://www.elastic.co/es/elastic-stack/features
PCA Principal Component Analysis [21] Elastic Search. (2019). The Elastic Stack. Meet the Core Products.
ROC Receiver Operating Characteristics Accessed: Sep. 1, 2019. [Online]. Available: https://www.elastic.co/
SEM Security Event Management es/products/elastic-stack
[22] J. Camacho and J. M. García-Jiménez. (2018). FCParser. [Online]. Avail-
SDN Software Defined Network able: https://github.com/josecamachop/FCParser
SIEM Security Information and Event Management [23] A. AlEroud, Z. Yan, and J. M. Namayanja, Information Fusion for Cyber-
SIM Security Information Management Security Analytics (Studies in Computational Intelligence), I. Alsmadi
and G. K. A. Aleroud, Eds. Cham, Switzerland: Springer, 2017.
SNMP Simple Network Management Packet
[24] R. Bejtlich, The Practice of Network Security Monitoring. San Francisco,
UTM Universal Threat Management CA, USA: No Starch Press, 2013.
[25] T. G. Doeswijk, A. K. Smilde, J. A. Hageman, J. A. Westerhuis, and
F. A. van Eeuwijk, ‘‘On the increase of predictive performance with high-
REFERENCES
level data fusion,’’ Anal. Chim. Acta, vol. 705, nos. 1–2, pp. 41–47,
[1] Rapid7. (2015). Prevention vs Detection, Rebalancing Your Oct. 2011.
Security Program. Accessed: Jul. 16, 2020. [Online]. Available: [26] M. Cocchi, ‘‘Introduction: Ways and means to deal with data from mul-
https://www.rapid7.com/resources/prevention-vs-detection/ tiple sources,’’ in Data Fusion Methodology and Applications, vol. 31.
[2] R. Samson. (2020). Prevention vs detection-based security approach. Amsterdam, The Netherlands: Elsevier, 2019, pp. 1–26.
Clearnetwork. Accessed: Jul. 16, 2020. [Online]. Available: [27] A. K. Smilde and I. V. Mechelen, ‘‘A framework for low-level data
https://www.clearnetwork.com/prevention-vs-detection-cybersecurity- fusion,’’ in Data Fusion Methodology and Applications, vol. 31.
approach/ Amsterdam, The Netherlands: Elsevier, 2019, ch. 2, pp. 27–50.
[3] Comodo. (2020). Advanced Threat Protection: Security Incident [28] Z. Yu and J. J. P. Tsai, Intrusion Detection: A Machine Learning Approach
Response Tools. Accessed: Jun. 2, 2020. [Online]. Available: (Electrical and Computer Engineering), vol. 3. London, U.K.: Imperial
https://cutt.ly/TyXyxJz College Press, 2011.
[4] R. Bejtlich, The TAO of the Network Security Monitoring: Beyond Intru- [29] J. Xie, F. R. Yu, T. Huang, R. Xie, J. Liu, C. Wang, and Y. Liu, ‘‘A survey
sion Detection. Reading, MA, USA: Addison-Wesley, 2005. of machine learning techniques applied to software defined networking
[5] R. G. Bace, Intrusion Detection (Technology Series). New York, NY, (SDN): Research issues and challenges,’’ IEEE Commun. Surveys Tuts.,
USA: Macmillan Technical Publishing, 2000. vol. 21, no. 1, pp. 393–430, 1st Quart., 2019.
[6] J. Camacho, G. Maciá-Fernández, J. E. D. Verdejo, and [30] P. García-Teodoro, J. Díaz-Verdejo, G. Maciá-Fernández, and E. Vázquez,
P. García-Teodoro, ‘‘Tackling the big data 4 vs for anomaly detection,’’ in ‘‘Anomaly-based network intrusion detection: Techniques, systems and
Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS), challenges,’’ Comput. Secur., vol. 28, nos. 1–2, pp. 18–28, Feb. 2009.
Apr. 2014, pp. 500–505. [31] M. Iturbe, ‘‘Data-driven anomaly detection in industrial networks,’’
[7] X. Ji, K. Huang, L. Jin, H. Tang, C. Liu, Z. Zhong, W. You, X. Xu, Ph.D. dissertation, Mondragon Unibertsitatea, Mondragón, Spain, 2017.
H. Zhao, J. Wu, and M. Yi, ‘‘Overview of 5G security technology,’’ Sci. [32] M. Collins, Network Security Through Data Analysis: Building Situa-
China Inf. Sci., vol. 61, no. 8, pp. 1869–1919, 2018. tional Awareness, O. Media, Ed. Sebastopol, CA, USA: O’Reilly, 2014.

112756 VOLUME 9, 2021


M. Fuentes-García et al.: Present and Future of NSM

[33] D. J. Marchette, Computer Intrusion Detection and Network Monitoring: [59] M. Probert. (2016). Grep, awk and sed—Three VERY useful command-
A Statistical Viewpoint (Statistics for Engineering and Information Sci- line utilities. University of York. Accessed: Feb. 22, 2021. [Online].
ence). New York, NY, USA: Springer, 2001. Available: https://bit.ly/3pIqCph
[34] INCIBE. (2017). Diseño y Configuración de IPS, IDS y SIEM en Sis- [60] L. Carbonell. (2019). Filtros: Awk, Grep, Sed y Cut.
temas de Control Industrial. Accessed: Sep. 3, 2019. [Online]. Avail- Accessed: Feb. 22, 2021. [Online]. Available: https://bit.ly/3knlPbP
able: https://www.incibe-cert.es/blog/diseno-y-configuracion-ips-ids-y- [61] Elastic Stack. (2021). Logstash. Centraliza, Transforma y Alma-
siem-sistemas-control-industrial cena Tus Datos. Accessed: Feb. 22, 2021. [Online]. Available:
[35] J. Camacho, J. M. García-Giménez, N. M. Fuentes-García, and https://www.elastic.co/es/logstash
G. Maciá-Fernández, ‘‘Multivariate big data analysis for intrusion detec- [62] T. Alpcan and T. Basar, Network Security: A Decision and Game-
tion: 5 steps from the haystack to the needle,’’ Comput. Secur., vol. 87, Theoretic Approach. Cambridge, U.K.: Cambridge Univ. Press, 2011.
Nov. 2019, Art. no. 101603. [63] Cisco. (2014). SNORT(R) Users Manual. Active Response.
[36] T. Kourti and J. F. MacGregor, ‘‘Multivariate SPC methods for process Accessed: Oct. 2, 2020. [Online]. Available: http://manual-snort-
and product monitoring,’’ J. Qual. Technol., vol. 28, no. 4, pp. 409–428, org.s3-website-us-east-1.amazonaws.com/node26.html
Oct. 1996. [64] Cisco and Sourcefire. (1998). Snort. Accessed: Sep. 1, 2019. [Online].
[37] M. Fuentes-García, ‘‘Multivariate statistical network monitoring for net- Available: https://www.snort.org/
work security based on principal component analysis,’’ Ph.D. dissertation, [65] (2020). Suricata. Accessed: Sep. 2, 2020. [Online]. Available:
Univ. Granada, Granada, Spain, 2020. https://suricata-ids.org/
[38] D. P. Joseph and J. Norman, ‘‘An analysis of digital forensics in cyber [66] ATT Cybersecurity. (2020). Suricata IDS: An Overview of
security,’’ in Proc. 1st Int. Conf. Artif. Intell. Cogn. Comput., R. Bapi, Threading Capabilities. Accessed: Jun. 2, 2020. [Online]. Available:
K. Rao, and M. Prasad, Eds. Singapore: Springer, 2019, pp. 701–708. https://cutt.ly/jyZbAeI
[39] K. Okereafor and R. Djehaiche, ‘‘New approaches to the application of [67] OSSEC Project Team. (2008). Open Source HIDS SECurity.
digital forensics in cybersecurity: A proposal,’’ Int. J. Simul. Syst. Sci. Accessed: Aug. 17, 2019. [Online]. Available: https://www.ossec.net/
Technol., vol. 21, no. 2, pp. 1–36, Mar. 2020. [68] Gartner. (2019). What is Security Information and Event
[40] E. Chanthery and A. Subias, ‘‘Diagnosis approaches for detection and Management (SIEM)? Accessed: Sep. 17, 2019. [Online]. Available:
isolation of cyber attacksand faults on a two-tank system,’’ in Proc. 30th https://www.gartner.com/reviews/market/security-information-event-
Int. Workshop Princ. Diagnosis DX, 2019, pp. 1–9. management
[41] Q. P. Nguyen, K. W. Lim, D. M. Divakaran, K. H. Low, and M. C. Chan, [69] K. Kavanagh, T. Bussa, and G. Sadowski. (Dec. 2018). Magic
‘‘GEE: A gradient-based explainable variational autoencoder for network quadrant for security information and event management. Gartner.
anomaly detection,’’ in Proc. IEEE Conf. Commun. Netw. Secur. (CNS), Accessed: Sep. 15, 2019. [Online]. Available: https://www.gartner.com/
Jun. 2019, pp. 91–99. en/documents/3894573/magic-quadrant-for-security-information-and-
[42] A. Lakhina, M. Crovella, and C. Diot, ‘‘Diagnosing network-wide traffic event-manage, techreport
anomalies,’’ ACM SIGCOMM Comput. Commun. Rev., vol. 34, no. 4, [70] V. Paxson and R. Sommer. (1994). The Zeek Network Security
p. 219, Oct. 2004. Monitor (Bro). Accessed: Aug. 18, 2019. [Online]. Available:
[43] J. Camacho, A. Pérez-Villegas, P. García-Teodoro, and
https://www.zeek.org/
G. Maciá-Fernández, ‘‘PCA-based multivariate statistical network
[71] Bricata. (2020). What is Bro IDS (Zeek)? And Why IDS Doesnt Effectively
monitoring for anomaly detection,’’ Comput. Secur., vol. 59, pp. 118–137,
Describe it Overview and Resources. Accessed: Jun. 2, 2020. [Online].
Jun. 2016.
Available: https://bricata.com/blog/what-is-bro-ids/
[44] M. Fuentes-García, G. Maciá-Fernández, and J. Camacho, ‘‘Evaluation of
[72] Prelude. (2020). PRELUDE SIEM. Smart Security.
diagnosis methods in PCA-based multivariate statistical process control,’’
Accessed: Sep. 10, 2020. [Online]. Available: https://cutt.ly/bfTTiuN
Chemometric Intell. Lab. Syst., vol. 172, pp. 194–210, Jan. 2018.
[73] Y. Vandoorselaere. (2005). Prelude. Accessed: Aug. 18, 2019. [Online].
[45] AT&T-Cybersecurity. (2020). Incident Response Tools.
Available: https://www.prelude-siem.com/en/author/otran/page/2/
Accessed: Jun. 2, 2020. [Online]. Available: https://cutt.ly/2yXypMF
[74] Prelude. (2020). Prelude OSS Project. Accessed: Sep. 10, 2020. [Online].
[46] Cynet. (2020). The 7 Best Free and Open-Source Incident Response Tools.
Available: https://www.prelude-siem.org/
Accessed: Jun. 2, 2020. [Online]. Available: https://cutt.ly/ayXykEL
[47] National Cyber Security Centre. (2019). Small Business Guide: [75] Wazuh Inc. (2019). The Open Source Security Platform.
Response & Recovery. Accessed: Jul. 17, 2020. [Online]. Available: Accessed: Oct. 18, 2019. [Online]. Available: https://wazuh.com/
https://cutt.ly/DapvwAL [76] AT&T-Cybersecurity. (2019). AlienVault(R) Unified Security Man-
[48] Deloitte. (2016). Cyber Crisis Management: Readiness, Response, agement(R) (USM). Accessed: Nov. 8, 2019. [Online]. Available:
and Recovery. Accessed: Sep. 8, 2020. [Online]. Available: https://www.alienvault.com/products
https://cutt.ly/wfWnXWC [77] AT&T-Cybersecurity. (2012). Open Threat Exchange (OTX).
[49] J. Kisielius. (2020). Automated incident response explained. AlienVault. Accessed: Nov. 8, 2019. [Online]. Available: https://www.alienvault.
Accessed: Sep. 8, 2020. [Online]. Available: https://cutt.ly/3fWn72T com/open-threat-exchange
[50] Varonis. (2020). How to Respond to a Cyber Security Incident. [78] AT&T-Cybersecurity. (2016). AlienVault(R) OSSIM(TM), Open
Accessed: Sep. 8, 2020. [Online]. Available: https://www.varonis.com/ Source Security Information and Event Management (SIEM).
blog/respond-cyber-security-incident/ Accessed: Nov. 8, 2019. [Online]. Available: https://www.alienvault.
[51] V. Jacobson, C. Leres, and S. McCanne. (1988). Tcpdump and Libpcap. com/products/ossim
Accessed: Sep. 3, 2019. [Online]. Available: https://www.tcpdump.org/ [79] K. Kavanagh, T. Bussa, and G. Sadowski. (Dec. 2020). Magic
[52] G. Combs. (1998). Wireshark. Accessed: Sep. 1, 2019. [Online]. Avail- quadrant for security information and event management. Gartner.
able: https://www.wireshark.org/ Accessed: Feb. 24, 2021. [Online]. Available: https://gtnr.it/37IM3Ak
[53] Cisco-Systems. (2004). Cisco Systems NetFlow Services Export Ver- [80] Gartner. (2019). Gartner Magic Quadrant. Accessed: Nov. 8, 2019.
sion 9. Accessed: Sep. 1, 2019. [Online]. Available: https://tools.ietf. [Online]. Available: https://www.gartner.com/en/research/
org/html/rfc3954 methodologies/magic-quadrants-research
[54] C. Bullard. (2014). Argus. QoSient. Accessed: Sep. 5, 2019. [Online]. [81] Splunk. (2005). Use Splunk App for Infrastructure.
Available: https://qosient.com/argus/man/man8/argus.8.pdf Accessed: Nov. 25, 2019. [Online]. Available: https://cutt.ly/itOzLSy
[55] QoSient. (2007). Ra Client. Accessed: Aug. 15, 2019. [Online]. Available: [82] Splunk. (2020). One Platform for All Your Data Needs. Turn
https://manpages.debian.org/testing/argus-client/ra.1.en.html Data Into Outcomes. Accessed: Sep. 9, 2020. [Online]. Available:
[56] Open-Source. (2019). NFDUMP. Accessed: Aug. 17, 2019. [Online]. https://cutt.ly/7fRQUMt
Available: http://nfdump.sourceforge.net/ [83] Gartner Inc. (2018). Gartner 2018 Magic Quadrant for SIEM.
[57] J. Schoenwaelder. (2008). Simple network management protocol Accessed: Oct. 18, 2019. [Online]. Available: https://cutt.ly/ztOzY3S
(SNMP) context EngineID discovery. Jacobs University Bremen. [84] AlienVault. (2019). Compare AlienVault Products.
Accessed: Nov. 27, 2019. [Online]. Available: https://tools.ietf.org/ Accessed: Nov. 8, 2019. [Online]. Available: https://www.alienvault.
html/rfc5343 com/products/ossim/compare
[58] C. Lonvick. (2001). The BSD syslog protocol. Cisco System. [85] AT&T-Cybersecurity. (2020). Using the AlienApp for AT&T Cybersecu-
Accessed: Nov. 27, 2019. [Online]. Available: https://www.ietf.org/ rity Forensics and Response Actions. Accessed: Jun. 2, 2020. [Online].
rfc/rfc3164.txt Available: https://cutt.ly/cyZBA1v

VOLUME 9, 2021 112757


M. Fuentes-García et al.: Present and Future of NSM

[86] Gartner. (2019). Unified Threat Management (UTM). [114] SIGMONA. (2016). Software-Defined and Virtualizaed Mobile
Accessed: Sep. 17, 2019. [Online]. Available: https://www.gartner.com/ Networks. Accessed: Jan. 22, 2021. [Online]. Available:
en/information-technology/glossary/unified-threat-management-utm https://tinyurl.com/y5gatld6
[87] P. García-Teodoro, J. E. Díaz-Verdejo, and J. M. López-Soler, Trans- [115] I. Al Ridhawi, M. Aloqaily, Y. Kotb, Y. Al Ridhawi, and Y. Jararweh,
misión de Datos y Redes de Computadores. London, U.K.: Pearson, 2014. ‘‘A collaborative mobile edge computing and user solution for
[88] W. Stallings, Data and Computer Communications, 8th ed. Boston, MA, service composition in 5G systems,’’ Trans. Emerg. Telecommun.
USA: Pearson, 2014. Technol., vol. 29, no. 11, p. e3446, 2018. [Online]. Available:
[89] BAKOTECH. (2018). WatchGuard UTM is Recognized the Only https://onlinelibrary.wiley.com/doi/abs/10.1002/ett.3446
Visionary in the Gartner Magic Quadrant for the 4th Time. [116] M. Liyanage, I. Ahmad, J. Okwuibe, E. M. de Oca, H. L. Mai,
Accessed: Jun. 2, 2020. [Online]. Available: https://bit.ly/3aNkYO8 O. López, and M. Uriarte, Software Defined Security Monitoring
[90] R. Kaur and C. Neiva. (Dec. 2018). Gartner magic quadrant for in 5G Networks. Hoboken, NJ, USA: Wiley, Jan. 2018,
unified threat management SMB multifunction firewalls. Gartner. pp. 231–243.
Accessed: Feb. 24, 2021. [Online]. Available: https://gtnr.it/3sp51Up [117] M. Aloqaily, O. Bouachir, A. Boukerche, and I. A. Ridhawi, ‘‘Design
[91] Barracuda. (2020). Barracuda CloudGen Firewall. guidelines for blockchain-assisted 5G-UAV networks,’’ IEEE Netw.,
Accessed: Jun. 2, 2020. [Online]. Available: https://cutt.ly/FgefB66 vol. 35, no. 1, pp. 64–71, Jan./Feb. 2021.
[92] WatchGuard. (2020). WatchGuard Security Services. [118] S. Berger, O. Bürger, and M. Röglinger, ‘‘Attacks on the
Accessed: Jun. 2, 2020. [Online]. Available: https://www.watchguard. industrial Internet of Things—Development of a multi-layer
com/wgrd-products/security-services taxonomy,’’ Comput. Secur., vol. 93, Jun. 2020, Art. no. 101790.
[93] Sophos. (2020). The World’s Best Visibility, Protection, and Response. [Online]. Available: http://www.sciencedirect.com/science/article/pii/
Accessed: Jun. 2, 2020. [Online]. Available: https://www.sophos.com/en- S0167404820300754
us/products/next-gen-firewall.aspx [119] J. Camacho, R. Bro, and D. Kotz, ‘‘Networkmetrics unraveled:
[94] B. Visscher. (2014). Sguil. Accessed: Aug. 18, 2019. [Online]. Available: MBDA in action,’’ 2019, arXiv:1907.02677. [Online]. Available:
https://sourceforge.net/projects/sguil/ http://arxiv.org/abs/1907.02677 and https://dblp.uni-trier.de/rec/bibtex/
[95] S. Brisa. (2015). Squert Security Art Work. Accessed: Feb. 22, 2021. journals/corr/abs-1907-02677
[Online]. Available: https://bit.ly/3uljUce [120] A. S. Da Silva, J. A. Wickboldt, L. Z. Granville, and A. Schaeffer-Filho,
[96] Security Onion Solutions. (2008). Security Onion. ‘‘ATLANTIC: A framework for anomaly traffic detection, classification,
Accessed: Aug. 20, 2019. [Online]. Available: https://securityonion.net/ and mitigation in SDN,’’ in Proc. IEEE/IFIP Netw. Oper. Manage. Symp.
[97] Elastic. (2000). X-Pack. Accessed: Sep. 1, 2019. [Online]. Available: (NOMS), Apr. 2016, pp. 27–35.
https://www.elastic.co/es/what-is/open-x-pack [121] T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho,
[98] Microsoft. (2020). La Versión de Windows Más Segura Creada ‘‘Deep recurrent neural network for intrusion detection in SDN-based
Hasta la Fecha. Accessed: Jul. 16, 2020. [Online]. Available: networks,’’ in Proc. 4th IEEE Conf. Netw. Softwarization Workshops
https://www.microsoft.com/es-es/windows/comprehensive-security (NetSoft), Jun. 2018, pp. 202–206.
[99] G. Lyon. (1997). Nmap Network Mapper. Accessed: Aug. 17, 2019.
[122] P. Wang, K.-M. Chao, H.-C. Lin, W.-H. Lin, and C.-C. Lo, ‘‘An efficient
[Online]. Available: https://nmap.org/
flow control approach for SDN-based network threat detection and migra-
[100] Tenable. (1988). Nessus. Accessed: Aug. 20, 2019. [Online]. Available: tion using support vector machine,’’ in Proc. IEEE 13th Int. Conf. e-Bus.
https://cutt.ly/9tOlEnR Eng. (ICEBE), Nov. 2016, pp. 56–63.
[101] Greenbone Networks. (2009). Open Vulnerability Assessment
[123] C. Song, Y. Park, K. Golani, Y. Kim, K. Bhatt, and K. Goswami,
Scanner (OpenVAS). Accessed: Sep. 18, 2019. [Online]. Available:
‘‘Machine-learning based threat-aware system in software defined net-
http://openvas.org/
works,’’ in Proc. 26th Int. Conf. Comput. Commun. Netw. (ICCCN),
[102] National Institute of Standards and Technology. (2019). National Vulner-
Jul. 2017, pp. 1–9.
ability Database (NVD). Accessed: Aug. 14, 2019. [Online]. Available:
[124] R. M. A. Ujjan, Z. Pervez, and K. Dahal, ‘‘Suspicious traffic detection
https://nvd.nist.gov/
in SDN with collaborative techniques of snort and deep neural net-
[103] MITRE. (1999). Common Vulnerabilities and Exposures (CVE).
works,’’ in Proc. IEEE 20th Int. Conf. High Perform. Comput. Commun.;
Accessed: Sep. 3, 2019. [Online]. Available: https://cve.mitre.org/
IEEE 16th Int. Conf. Smart City; IEEE 4th Int. Conf. Data Sci. Syst.
[104] Microsoft. (2018). Review Event Logs and Error Codes to Troubleshoot
(HPCC/SmartCity/DSS), Jun. 2018, pp. 915–920.
Issues With Microsoft Defender Antivirus. Accessed: Feb. 22, 2021.
[Online]. Available: https://bit.ly/3pCLgqE [125] S. Badotra and S. N. Panda, ‘‘SNORT based early DDoS detection system
[105] J. Jiménez. (2019). Cómo Ver la Información Que Almacena Windows using opendaylight and open networking operating system in software
Defender de los Análisis Hechos Redes Zone. Accessed: Feb. 22, 2021. defined networking,’’ Cluster Comput., vol. 24, no. 1, pp. 501–513,
[Online]. Available: https://bit.ly/2Nwym0r Mar. 2021.
[106] Kaspersky. (2018). Protege Tu Hogar Con Kaspersky IoT Scan- [126] T. Jafarian, M. Masdari, A. Ghaffari, and K. Majidzadeh, ‘‘Security
ner. Accessed: Jan. 26, 2021. [Online]. Available: https://tinyurl.com/ anomaly detection in software-defined networking based on a
y5koktek prediction technique,’’ Int. J. Commun. Syst., vol. 33, no. 14,
[107] Kaspersky. (2018). Kaspersky Security for Virtualization 4.0 Agentless. p. e4524, 2020. [Online]. Available: https://onlinelibrary.wiley.
Kaspersky Security Logs. Accessed: Feb. 22, 2021. [Online]. Available: com/doi/abs/10.1002/dac.4524
https://bit.ly/3bu54HF [127] T. Nagata-Bolivar, ‘‘Escalamiento de seguridad en redes SDN para
[108] Kaspersky. (2020). Kaspersky Threat Intelligence. generación de reglas en NIDS empleando J48 y TENSORFLOW para
Accessed: Jul. 16, 2020. [Online]. Available: https://www.kaspersky.es/ analizar ataques basados en tiempo,’’ in Proc. 15th LACCEI Int. Multi-
enterprise-security/threat-intelligence Conf. Eng., Educ., Technol., 2017.
[109] Kaspersky. (2020). Kaspersky Security Cloud Free. [128] K. Nam and K. Kim, ‘‘A study on SDN security enhancement using
Accessed: Jul. 16, 2020. [Online]. Available: https://www.kaspersky. open source IDS/IPS suricata,’’ in Proc. Int. Conf. Inf. Commun. Technol.
es/free-antivirus Converg. (ICTC), Oct. 2018, pp. 1124–1126.
[110] J. Molina. (2016). Threat Intelligence: El Porqué de las Cosas. [129] Barracuda. (2021). Secure SD-WAN. Boost Application Performance
Accessed: Oct. 18, 2019. [Online]. Available: https://www. and Reduce Costs. Accessed: Jan. 26, 2021. [Online]. Available:
welivesecurity.com/la-es/2016/12/01/threat-intelligence/ https://tinyurl.com/y5qhuj3x
[111] A. Vincent, R. Barger, A. Pendergast, and L. Reichel. (2011). [130] WatchGuard. Don’t Deploy Half an SD-WAN Solution. Accessed:
Threat Connect. Accessed: Oct. 18, 2019. [Online]. Available: Jan. 26, 2021. [Online]. Available: https://tinyurl.com/y57sqde7
https://threatconnect.com/ [131] M. J. Jo and J. S. Shin, ‘‘MWMon: A software defined network-based
[112] (2019). Cyber Threat Alliance. Accessed: Oct. 20, 2019. [Online]. Avail- malware monitor,’’ J. Korea Ind. Inf. Syst. Res., vol. 20, no. 5, pp. 37–44,
able: https://www.cyberthreatalliance.org/ Oct. 2015.
[113] CSIRT-Gadgets. (2019). The FASTEST Way to Consume Threat [132] J. B. García, V. S. Vilchez, J. Z. Castro, and J. L. Q. Arroyo, ‘‘Using cyber
Intelligence. Accessed: Nov. 8, 2019. [Online]. Available: threat intelligence to prevent malicious known traffic in a SDN physical
https://csirtgadgets.com/commits/2018/1/6/the-fastest-way-to-consume- testbed,’’ in Proc. IEEE 26th Int. Conf. Electron., Electr. Eng. Comput.
threat-intel (INTERCON), Aug. 2019, pp. 1–4.

112758 VOLUME 9, 2021


M. Fuentes-García et al.: Present and Future of NSM

[133] M. Nobakht, V. Sivaraman, and R. Boreli, ‘‘A host-based intrusion detec- [152] P. I. R. Grammatikis, P. G. Sarigiannidis, and I. D. Moscholiosb,
tion and mitigation framework for smart home IoT using OpenFlow,’’ ‘‘Securing the Internet of Things: Challenges, threats and solutions,’’
in Proc. 11th Int. Conf. Availability, Rel. Secur. (ARES), Aug. 2016, Internet Things, vol. 5, pp. 41–70, Mar. 2019. [Online]. Available:
pp. 147–156. http://www.sciencedirect.com/science/article/pii/S2542660518301161
[134] S. Otoum, B. Kantarci, and H. Mouftah, ‘‘A comparative study of [153] M. A. Ferrag, M. Babaghayou, and M. A. Yazici, ‘‘Cyber security for
AI-based intrusion detection techniques in critical infrastructures,’’ fog-based smart grid SCADA systems: Solutions and challenges,’’ J. Inf.
2020, arXiv:2008.00088. [Online]. Available: https://arxiv.org/abs/2008. Secur. Appl., vol. 52, Jun. 2020, Art. no. 102500. [Online]. Available:
00088 http://www.sciencedirect.com/science/article/pii/S2214212619311408
[135] M. Aloqaily, S. Otoum, I. A. Ridhawi, and Y. Jararweh, ‘‘An intrusion [154] A. Tzounis, N. Katsoulas, T. Bartzanas, and C. Kittas, ‘‘Internet of
detection system for connected vehicles in smart cities,’’ Ad Hoc Netw., Things in agriculture, recent advances and future challenges,’’ Biosyst.
vol. 90, Jul. 2019, Art. no. 101842. [Online]. Available: http://www. Eng., vol. 164, pp. 31–48, Dec. 2017. [Online]. Available: http://www.
sciencedirect.com/science/article/pii/S1570870519301131 sciencedirect.com/science/article/pii/S1537511017302544
[136] G. Efstathopoulos, P. R. Grammatikis, P. Sarigiannidis, V. Argyriou, [155] M. A. Ferrag, L. Shu, X. Yang, A. Derhab, and L. Maglaras, ‘‘Security and
A. Sarigiannidis, K. Stamatakis, M. K. Angelopoulos, and privacy for green IoT-based agriculture: Review, blockchain solutions,
S. K. Athanasopoulos, ‘‘Operational data based intrusion detection and challenges,’’ IEEE Access, vol. 8, pp. 32031–32053, 2020.
system for smart grid,’’ in Proc. IEEE 24th Int. Workshop Comput. [156] M. A. Lawal, R. A. Shaikh, and S. R. Hassan, ‘‘Security analysis of
Aided Modeling Design Commun. Links Netw. (CAMAD), Sep. 2019, network anomalies mitigation schemes in IoT networks,’’ IEEE Access,
pp. 1–6. vol. 8, pp. 43355–43374, 2020.
[137] J. Arshad, M. A. Azad, M. M. Abdeltaif, and K. Salah, ‘‘An intrusion [157] B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga,
detection framework for energy constrained iot devices,’’ Mech. Syst. Sig- ‘‘A survey of intrusion detection in Internet of Things,’’ J. Netw.
nal Process., vol. 136, Feb. 2020, Art. no. 106436. [Online]. Available: Comput. Appl., vol. 84, pp. 25–37, Apr. 2017. [Online]. Available:
http://www.sciencedirect.com/science/article/pii/S0888327019306570 http://www.sciencedirect.com/science/article/pii/S1084804517300802
[138] I. Al Ridhawi, S. Otoum, M. Aloqaily, Y. Jararweh, and T. Baker, [158] F. Cauteruccio, L. Cinelli, E. Corradini, G. Terracina, D. Ursino,
‘‘Providing secure and reliable communication for next generation L. Virgili, C. Savaglio, A. Liotta, and G. Fortino, ‘‘A framework
networks in smart cities,’’ Sustain. Cities Soc., vol. 56, May 2020, for anomaly detection and classification in multiple IoT scenarios,’’
Art. no. 102080. [Online]. Available: http://www.sciencedirect. Future Gener. Comput. Syst., vol. 114, pp. 322–335, Jan. 2021.
com/science/article/pii/S2210670720300676 [Online]. Available: http://www.sciencedirect.com/science/article/
[139] M. Eskandari, Z. H. Janjua, M. Vecchio, and F. Antonelli, ‘‘Passban pii/S0167739X19335253
IDS: An intelligent anomaly-based intrusion detection system for IoT [159] A. Sánchez. (2017). Protege Tu Red Frente a Intrusos Con Bitde-
edge devices,’’ IEEE Internet Things J., vol. 7, no. 8, pp. 6882–6897, fender Home Scanner. Accessed: Jan. 26, 2021. [Online]. Available:
Aug. 2020. https://tinyurl.com/yyguxsyo
[140] S. Otoum, B. Kantarci, and H. T. Mouftah, ‘‘A novel ensemble method [160] Avast. (2020). Seguridad del IoT. Accessed: Jan. 26, 2021. [Online].
for advanced intrusion detection in wireless sensor networks,’’ in Proc. Available: https://tinyurl.com/yykeknqs
IEEE Int. Conf. Commun. (ICC), Jun. 2020, pp. 1–6. [161] Barracuda. (2021). Barracuda CloudGen Firewall F-Series for
[141] A. Tabassum, A. Erbad, A. Mohamed, and M. Guizani, ‘‘Privacy- Internet of Things. Accessed: Jan. 26, 2021. [Online]. Available:
preserving distributed IDS using incremental learning for IoT health https://tinyurl.com/y54kzxg5
systems,’’ IEEE Access, vol. 9, pp. 14271–14283, 2021. [162] J. Bryan. (2020). An increased number of physical and cyber risks lurked
[142] Bitdefender. Bitdefender IoT Security Platform. Smart Home Cyberse- as 2019 came to a close. Gartner. Accessed: Feb. 3, 2021. [Online].
curity for Your Business. Accessed: Feb. 24, 2021. [Online]. Available: Available: https://tinyurl.com/y5xvv7tt
https://www.bitdefender.com/iot/ [163] J. Lavelle. (2020). Gartner emerging risk survey shows renewed COVID-
[143] Avast. Avast Smart Home Security. Accessed: Jan. 26, 2021. [Online]. 19 outbreak as top executive concern. Gartner. Accessed: Feb. 3, 2021.
Available: https://www.avast.com/smarthome [Online]. Available: https://tinyurl.com/y5m47n52
[144] Barracuda. (2021). Software-Defined Wide Area Network [164] E. Sisinni, A. Saifullah, S. Han, U. Jennehag, and M. Gidlund, ‘‘Industrial
(SD-WAN). Accessed: Jan. 26, 2021. [Online]. Available: Internet of Things: Challenges, opportunities, and directions,’’ IEEE
https://tinyurl.com/yxhrb8lg Trans. Ind. Informat., vol. 14, no. 11, pp. 4724–4734, Nov. 2018.
[145] WatchGuard. (2021). About SD-WAN. Accessed: Jan. 26, 2021. [Online]. [165] H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, ‘‘The indus-
Available: https://tinyurl.com/y4vnvnc8 trial Internet of Things (IIoT): An analysis framework,’’ Comput.
[146] L. Patrono, L. Atzori, P. Šolić, M. Mongiello, and A. Almeida, ‘‘Chal- Ind., vol. 101, pp. 1–12, Oct. 2018. [Online]. Available: http://www.
lenges to be addressed to realize Internet of Things solutions for smart sciencedirect.com/science/article/pii/S0166361517307285
environments,’’ Future Gener. Comput. Syst., vol. 111, pp. 873–878, [166] R. Ande, B. Adebisi, M. Hammoudeh, and J. Saleem, ‘‘Internet of
Oct. 2020. [Online]. Available: http://www.sciencedirect.com/ Things: Evolution and technologies from a security perspective,’’ Sustain.
science/article/pii/S0167739X19324628 Cities Soc., vol. 54, Mar. 2020, Art. no. 101728. [Online]. Available:
[147] S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, ‘‘Security, http://www.sciencedirect.com/science/article/pii/S2210670719303725
privacy and trust in Internet of Things: The road ahead,’’ Com- [167] J. Polge, J. Robert, and Y. L. Traon, ‘‘Assessing the impact of
put. Netw., vol. 76, pp. 146–164, Jan. 2015. [Online]. Available: attacks on OPC-UA applications in the industry 4.0 era,’’ in Proc.
http://www.sciencedirect.com/science/article/pii/S1389128614003971 16th IEEE Annu. Consum. Commun. Netw. Conf. (CCNC), Jan. 2019,
[148] K. T. Nguyen, M. Laurent, and N. Oualha, ‘‘Survey on secure commu- pp. 1–6.
nication protocols for the Internet of Things,’’ Ad Hoc Netw., vol. 32, [168] C. Bai, P. Dallasega, G. Orzes, and J. Sarkis, ‘‘Industry 4.0 tech-
pp. 17–31, Sep. 2015. [Online]. Available: http://www.sciencedirect. nologies assessment: A sustainability perspective,’’ Int. J. Prod.
com/science/article/pii/S1570870515000141 Econ., vol. 229, Nov. 2020, Art. no. 107776. [Online]. Available:
[149] E. Vasilomanolakis, J. Daubert, M. Luthra, V. Gazis, A. Wiesmaier, and https://www.sciencedirect.com/science/article/pii/S0925527320301559
P. Kikiras, ‘‘On the security and privacy of Internet of Things architec- [169] M. Gidlund, G. P. Hancke, M. H. Eldefrawy, and J. Akerberg, ‘‘Guest
tures and systems,’’ in Proc. Int. Workshop Secure Internet Things (SIoT), editorial: Security, privacy, and trust for industrial Internet of Things,’’
Sep. 2015, pp. 49–57. IEEE Trans. Ind. Informat., vol. 16, no. 1, pp. 625–628, Jan. 2020.
[150] D. Dragomir, L. Gheorghe, S. Costea, and A. Radovici, ‘‘A survey on [170] J. J. Hathaliya and S. Tanwar, ‘‘An exhaustive survey on security
secure communication protocols for IoT systems,’’ in Proc. Int. Workshop and privacy issues in healthcare 4.0,’’ Comput. Commun., vol. 153,
Secure Internet Things (SIoT), 2016, pp. 47–62. pp. 311–335, Mar. 2020. [Online]. Available: http://www.sciencedirect.
[151] M. B. M. Noor and W. H. Hassan, ‘‘Current research on Internet of com/science/article/pii/S0140366419311880
Things (IoT) security: A survey,’’ Comput. Netw., vol. 148, pp. 283–294, [171] A.-R. Sadeghi, C. Wachsmann, and M. Waidner, ‘‘Security and privacy
Jan. 2019. [Online]. Available: http://www.sciencedirect.com/ challenges in industrial Internet of Things,’’ in Proc. 52nd Annu. Design
science/article/pii/S1389128618307035 Automat. Conf., Jun. 2015, pp. 1–6.

VOLUME 9, 2021 112759


M. Fuentes-García et al.: Present and Future of NSM

[172] G. E. I. Selim et al., ‘‘Anomaly events classification and detection system JOSÉ CAMACHO received the degree in com-
in critical industrial Internet of Things infrastructure using machine learn- puter science from the University of Granada,
ing algorithms,’’ Multimedia Tools Appl., 2021, doi: 10.1007/s11042- Spain, in 2003, and the Ph.D. degree from the
020-10354-1. Technical University of Valencia, in 2007. He
[173] Splunk. (2017). Splunk(R) for Industrial Data and the IoT. is currently an Associate Professor with the
Accessed: Jan. 26, 2021. [Online]. Available: https://tinyurl.com/ Department of Signal Theory, Telematics and
y2xhmrxx Communication. He is also a Researcher with
the Information and Communication Technolo-
gies Research Centre, University of Granada. His
research interests include exploratory data analy-
sis, anomaly detection and optimization with multivariate techniques applied
to data of very different nature, including manufacturing processes, chemo-
metrics, and communication networks. He is especially interested in the
use of exploratory data analysis to Big Data. His Ph.D. was awarded with
MARTA FUENTES-GARCÍA received the mas- the second Rosina Ribalta Prize to the best Ph.D. projects in the field
ter’s degree in software development and the Ph.D. of information and communication technologies (ICT) from the EPSON
degree in information and communication tech- Foundation, and with the D. L. Massart Award in Chemometrics from the
nologies from the University of Granada. Her Belgian Chemometrics Society.
Ph.D. was focused in anomaly detection using
multivariate data analysis. Her research has been
mainly related to anomaly detection and diagnosis
both in industrial processes and network traffic. GABRIEL MACIÁ-FERNÁNDEZ is currently an
She also has work experience in different com- Associate Professor with the Department of Signal
panies as a programmer. She is currently a part Theory, Telematics and Communications, Univer-
of the Research Team with Fidesol, which is a technological innovation sity of Granada, Spain. He belongs to the Net-
support center. As a part of the EGIDA project, she is leading different work Engineering and Security (NESG) Research
initiatives and research related to security and privacy-based on ML and Group, University of Granada. His research inter-
anomaly detection in IoT devices, which are focused on Industry 4.0. Her ests include systems and network security, with
research interests include data science, statistics, exploratory data analysis, special emphasis on intrusion detection, reli-
and anomaly detection, with especial emphasis in those data which are able protocol design, penetration testing tech-
related to IT Security and industrial processes. She is particularly inter- niques, network information leakage, and denial of
ested in knowledge transfer from science to industry and small medium service.
enterprises.

112760 VOLUME 9, 2021

You might also like