<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Development of an integrated network threat detection system based on Wazuh, Suricata and Telegram Bot</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Rostyslav Lisnevskyi</string-name>
          <email>rostyslav.lisnevskyi@astanait.edu.kz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Saule Amanzholova</string-name>
          <email>s.amanzholova@astanait.edu.kz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jamilya Akhmetzhanova</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Aidana</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ikembayeva</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Darya Naumova</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Astana IT University</institution>
          ,
          <addr-line>Mangilik El avenue, 55/11Business center EXPO, block C1 Astana</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>International Information Technology University</institution>
          ,
          <addr-line>34/1 Manas St., Almaty, 050040</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <fpage>1</fpage>
      <lpage>2</lpage>
      <abstract>
        <p>This article presents the development and experimental evaluation of an integrated network threat detection system built on the open source software solutions Wazuh and Suricata, supplemented by the Telegram Bot API for rapid notification delivery. The developed architecture combines deep network traffic analysis, event correlation, and notification delivery, significantly reducing incident response times. Testing, conducted in an isolated lab environment, included modeling various attack types-from port scanning and SSH credential bruteforce to more complex scenarios such as ICMP/TCP flooding, DNS tunneling, SQL injection, and unauthorized transfer of confidential data via HTTP requests. The experiments provided a comprehensive assessment of the developed system's resilience to a wide range of network threats and confirmed its high effectiveness, resulting in accurate incident detection and minimal response time.</p>
      </abstract>
      <kwd-group>
        <kwd>1 SIEM</kwd>
        <kwd>NIDS</kwd>
        <kwd>network monitoring</kwd>
        <kwd>Wazuh</kwd>
        <kwd>Suricata</kwd>
        <kwd>Telegram Bot API</kwd>
        <kwd>open-source security</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>real-time incident response threat intelligence</kwd>
        <kwd>integration DNS tunneling</kwd>
        <kwd>SQL injection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Modern information systems are exposed to increasingly complex and diverse cyber threats, which
necessitates the construction of effective security monitoring systems. One of the key requirements
for such systems is maintaining a balance between incident detection efficiency, detection accuracy,
and architectural flexibility. Commercial SIEM (Security Information and Event Management)
solutions provide advanced functionality for centralized analysis and correlation of security events,
but their implementation is often accompanied by significant financial costs, integration complexity,
and high infrastructure requirements. Open-source tools represent an alternative approach that
provides modularity, cost-effectiveness, and adaptability. One of the most common solutions in this
class is Wazuh, a unified XDR/SIEM platform that implements endpoint monitoring, event
correlation, threat analysis, and cloud protection. Wazuh supports integration with a wide range of
log sources and uses correlation rules to detect anomalous behavior[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Another important component is Suricata, a high-performance open-source IDS/IPS engine that
provides deep network traffic analysis and detection of both signature-based and behavioral threats
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The integration of Wazuh and Suricata allows for a modular SIEM solution that covers both
system and network monitoring levels, while providing flexibility and transparency in the
architecture. Despite the extensive visualization and alerting capabilities provided by the Wazuh
panel, its functionality is primarily focused on centralized monitoring and may not be effective
enough to provide real-time notifications or mobile access. In such scenarios, it is advisable to use
messaging channels such as Telegram, which, through the Telegram Bot API, allows for a lightweight
and customizable mechanism for delivering critical notifications [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Thus, the current task is to
develop the architecture of an integrated system combining Wazuh, Suricata and Telegram Bot API.
The objective of this study is to develop an integrated low-cost real-time network threat detection
and response system that combines SIEM (Wazuh), IDS (Suricata) and Telegram Bot API capabilities
into a single architecture. This integration provides comprehensive network traffic analysis and
event correlation, as well as instant notification of identified incidents to responsible employees,
increasing the effectiveness of security monitoring at minimal cost.
      </p>
      <p>The research focuses on the processes of monitoring and detecting network threats in information
systems.</p>
      <p>The research focuses on methods and tools for integrating Wazuh (SIEM), Suricata (IDS/IPS), and
the Telegram Bot API to ensure prompt detection and notification of cyberattacks in real time.</p>
      <p>The proposed approach is novel in its integration of SIEM (Wazuh), IDS (Suricata), and Telegram
Bot API into a single, cost-effective architecture that achieves real-time detection with response times
under one second.</p>
      <p>The objective of the study is to develop and experimentally test an integrated network threat
detection and notification system that provides high accuracy, a response time of less than one
second, and minimal implementation and operating costs.</p>
      <p>The research's novelty lies in the development of an integrated architecture that synthesizes the
capabilities of the Wazuh SIEM platform, the Suricata network intrusion detection system, and the
Telegram Bot API into a single adaptive modular system that provides intelligent monitoring and
automated response to cyber threats in real time.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature review</title>
      <p>The objective of the review is to analyze modern methodologies and tools used in SIEM systems, with
a special focus on the integration of Wazuh, Suricata and Telegram Bot API to improve the security of
network infrastructure from cyber threats. A secondary objective is to study modern scientific
approaches and practical solutions aimed at optimizing security monitoring, vulnerability
management, data encryption and incident response processes.The literature review analyzes recent
studies on the use of these tools in real operating environments in order to identify their
effectiveness, limitations and development prospects in cybersecurity. Particular attention is paid to
the issues of event correlation, detection of anomalies in network traffic and operational alerting,
which allows us to assess the contribution of open technologies to the construction of adaptive and
scalable information security management systems.</p>
      <p>
        The use of Suricata for network traffic analysis is discussed in several studies [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Suricata is
highlighted as a powerful IDS (Intrusion Detection System) capable of identifying advanced threats
in network traffic. One study emphasizes how Suricata is used to monitor and analyze web traffic,
detecting vulnerabilities and potential attack vectors. Additionally, Suricata's integration with
Wazuh is examined as a key methodology for improving incident response and ensuring
comprehensive network security.
      </p>
      <p>
        The [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] explores Kali Linux as a tool not only for testing but also for protecting information
systems. The authors demonstrate how the distribution's standard utilities (Nmap, Wireshark,
Metasploit, Zeek) can be used for vulnerability analysis, attack modeling, and enhancing the
resilience of network infrastructure. The paper emphasizes the value of Kali Linux as a practical
platform for training and developing active cyberdefense methods.The combination of Wazuh and
Suricata in managing vulnerabilities and detecting threats is explored in several papers [
        <xref ref-type="bibr" rid="ref5 ref6">5,6</xref>
        ]. These
studies emphasize the importance of using Suricata for monitoring network traffic and detecting
anomalous activity, which can then be analyzed through Wazuh for further investigation. This
integrated approach allows for a more robust defense system that combines the capabilities of both
tools in identifying, assessing, and mitigating vulnerabilities across the network.
      </p>
      <p>
        Automating incident response is an essential aspect of modern cybersecurity practices. One study
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] investigates how Wazuh can be configured to automatically respond to security incidents. The
integration of Telegram with Wazuh allows for notifications to be sent instantly when predefined
security thresholds are met, enabling rapid action. The authors discuss the use of automated response
mechanisms to contain incidents and prevent further damage, thus improving overall security
efficiency.
      </p>
      <p>
        Wazuh's ability to detect threats in IoT environments is the subject of recent research [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. One
study discusses the role of SIEM solutions, specifically Wazuh, in monitoring IoT devices for signs of
potential intrusions. The integration of Suricata with Wazuh is particularly effective for analyzing
network traffic from IoT devices and identifying abnormal behavior that could indicate a cyberattack.
      </p>
      <p>
        The application of deep learning models in IDS/IPS systems like Suricata has been a recent focus
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Studies have explored how machine learning and deep learning algorithms can be integrated
with traditional IDS systems to improve their ability to detect advanced and unknown threats. These
studies show that Suricata's capabilities can be enhanced with AI-driven techniques, allowing for
more accurate and timely detection of cyber threats.
      </p>
      <p>
        The importance of threat intelligence sharing within SIEM systems is discussed in recent research
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. This study highlights how Wazuh and Suricata can be integrated with external threat
intelligence feeds to improve detection and response capabilities. By continuously updating threat
databases, Wazuh can provide up-to-date information on known threats, improving overall incident
detection and management.
      </p>
      <p>
        The authors of the [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] article highlight the main threats related to the security, stability and
scalability of distributed systems. The paper proposes a classification of risks and methods for their
assessment, taking into account the probability of occurrence and potential consequences. Risk
mitigation methods are described, including cryptographic solutions and access control systems. The
need for an integrated approach to risk management to ensure the reliability and security of
distributed systems is substantiated.
      </p>
      <p>
        The authors propose a model for comprehensive assessment of the quality of an information
security management system based on international standards ISO, NIST and COBIT [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The model
takes into account indicators of reliability, failure tolerance and expert assessments using fuzzy logic
methods. The solution allows organizations to more effectively allocate resources and improve data
protection.
      </p>
      <p>In the study, a mathematical model is developed that combines expert assessments with fuzzy
logic methods to analyze the effectiveness of system protection measures [13]. Particular attention is
paid to assessing the functional stability of the ISMS and its ability to operate under failures and
attacks. The model describes the relationships between various security measures and their
contribution to the overall protection of the system. A methodology is proposed for selecting the
most effective security measures with limited resources.</p>
      <p>The authors propose a method for multi-level protection of voice traffic in IP networks based on
Asterisk IP PBX using cryptography and steganography [14]. Experiments with different codecs have
shown that the approach provides high security with low transmission delays. Testing was
performed both in real networks and in the Opnet simulation environment. The method is
recommended for systems where secure and high-quality transmission of confidential information is
important</p>
      <p>The paper describes an approach to data balancing in cyber-physical systems to ensure QoS in a
fog computing environment [15]. The proposed method distributes the load between nodes, reduces
delays and packet losses, improving the performance of distributed applications.</p>
      <p>The paper analyzes machine learning methods used for intrusion detection systems, malware and
spam recognition and analysis [16]. The use of data mining methods and models built on large data
sets has improved the effectiveness of protection systems. The study showed that the use of data
science increases the intelligence of cyber defense processes, and unsupervised learning is one of the
most effective approaches to counteracting cyber threats.</p>
      <p>A literature review confirms that the combination of Wazuh, Suricata, and Telegram Bot API
enhances monitoring capabilities and speeds up incident response. Research highlights the key role
of machine learning, network traffic analysis, and process automation in preventing cyberattacks.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Problem statement</title>
      <p>Existing corporate and distributed networks are exposed to increasingly complex and multi-stage
cyberattacks that require rapid detection and response in real time. Commercial SIEM solutions
provide high accuracy of event correlation, but their implementation is often associated with high
costs, administrative complexity and limited customization flexibility. Existing dashboards, such as
Wazuh Dashboard, provide visualization and analytics, but do not always meet the requirements for
mobility and timely delivery of critical notifications. This reduces the speed of incident response and
increases the risk of developing attacks. The proposed integration of a network IDS/IPS engine
(Suricata) with a SIEM platform (Wazuh) and lightweight notification channels (Telegram Bot API)
will provide comprehensive monitoring, event correlation and instant transmission of information
about critical threats. Such an architecture should be modular, adaptable to various scenarios. The
solution should be easily reproducible and ensure integration into the infrastructure of enterprises of
any size.</p>
      <p>The objective of this study is to develop and experimentally validate an integrated real-time threat
detection and alerting system that combines accuracy, speed and flexibility with minimal
implementation and operating costs.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Methods and technologies</title>
      <p>To build the integrated monitoring system, a virtualized environment based on VMware
Workstation 17 Pro was used, including four virtual machines: the Wazuh server, the Wazuh agent
with Suricata, a Windows workstation, and the Kali Linux attack machine in Table 1. Wazuh was
deployed as part of the manager, indexer, and dashboard for log aggregation, event correlation, and
data normalization. Suricata was configured in NIDS mode to perform deep packet analysis and
generate alerts based on signatures and behavioral rules.</p>
      <p>For traffic analysis, logs from Suricata, specifically the eve.json file, were used. This file contains
structured records of network events and is generated on the machine running Suricata. It is then
forwarded to the Wazuh server for further analysis and correlation.</p>
      <p>The network traffic captured in eve.json was based on interactions between the Windows User
machine and the Attacker Machine, simulating attack scenarios such as port scanning, brute-force
attempts, and other intrusion patterns.</p>
      <p>Wazuh, the unified XDR and SIEM platform was utilized for event aggregation, log processing,
and correlation. Although there are predefined rules the custom rules were defined on the system to
classify and manage alerts generated by Suricata based on the severity of the detected threat [18]. The
rules define different levels of alert severity, which are mapped to corresponding Wazuh rules for
further analysis and reporting.</p>
      <p>Figure 1 confirms that Suricata severity levels were mapped to Wazuh rules to enable prioritized
alerting.\</p>
      <p>
        Suricata, the open-source NIDS, was used for deep packet inspection and signature-based
intrusion detection [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Suricata was also configured to listen to network traffic in real-time and
detect long-term attack patterns. Additionally, a cron job was set up to automatically update
Suricata’s signatures from the Emerging Threats (ET) Ruleset, ensuring that the system is always
equipped with the latest threat intelligence [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Figure 2 confirms that severity levels in Suricata are defined through the classification.config file,
enabling structured alert categorization. The classification.config file in Suricata defines how
classtype values used in detection rules are mapped to a textual description and a numeric severity
level (1 to 3). For example, “config classification: attempted-admin Attempted Administrator
Privilege Gain 1” means that any rule using “classtype:attempted-admin” will be treated with severity
level 1 (high). When a Suricata rule doesn't explicitly include a severity, Suricata uses the classtype
and refers to this file to determine the severity shown in logs like eve.json. By editing this file, you can
adjust how specific classtype values are interpreted in terms of severity across your Suricata
deployment [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        The Telegram Bot API was utilized to create a customized Telegram bot for the purpose of
delivering real-time security alerts. This bot is designed to forward alerts generated by the Wazuh
SIEM to a Telegram chat [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. It filters and transmits alerts based on their severity levels, specifically
prioritizing medium (level 7) and high (level 10) severity alerts from Suricata.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Implementation</title>
      <p>The integrated architecture consists of Suricata for network intrusion detection, Wazuh for event
correlation and SIEM functionality, and Telegram Bot API for real-time alert delivery. Figure 3
illustrates the interaction between components, where Suricata generates alerts recorded in eve.json,
Wazuh processes and correlates them using predefined and custom rules, and the Telegram Bot API
transmits high-priority alerts to a secure Telegram channel.</p>
      <p>Hardware and software configurations were as follows: Suricata version 7.0.12 and Wazuh version
4.12.0 on Ubuntu 22.04 (4 vCPU, 8–16 GB RAM), and a Telegram Bot implemented in Python 3.10
using the python-telegram-bot library. The attack simulations were executed from a Kali Linux
2024.3 host (4 vCPU, 8 GB RAM).</p>
      <p>Suricata utilized the Emerging Threats (ET) Open Ruleset, supplemented by custom signatures for
ICMP floods, TCP SYN scans, and HTTP credential exposure. Example custom rule:</p>
      <p>Wazuh correlation rules were designed to map Suricata alerts to specific severities and trigger
Telegram notifications for medium and high alerts. Decoders extracted Suricata fields such as
alert.signature_id, src_ip, and dst_ip from eve.json. Each alert was normalized, correlated, and
prioritized according to severity and frequency of occurrences.</p>
      <p>Telegram integration used HTTPS for communication with the Telegram API, ensuring message
confidentiality. Bot tokens were stored locally with strict access permissions (chmod 600). Chat ID
whitelisting prevented impersonation or unauthorized access. Only minimal alert data (timestamp,
severity, IP addresses) were transmitted, excluding payloads or sensitive context. Full logs remained
encrypted locally and backed up daily using rsync to a secure storage node.</p>
      <p>The system was fully deployed in a controlled virtualized environment using VMware, which
provided a flexible and isolated setup for testing various attack scenarios. This environment allowed
testing the entire integration of Wazuh, Suricata, and Telegram Bot API smoothly and reproducibly.
The following attack scenarios were tested: port scanning with “nmap”, password brute force attack
with “hydra”, and search engine attack with “Social-Engineer Toolkit”.</p>
      <p>The architecture of the developed system is shown in Figure 5 and includes four key components
deployed in a virtualized VMware Workstation Pro environment: the Wazuh server, the Wazuh
agent with Suricata, a Windows workstation, and a Kali Linux attack machine. The components
interact via a virtual network simulating a corporate environment.</p>
      <p>The Wazuh server has a manager, indexer, and control panel installed, providing log aggregation,
event correlation, and security data visualization. The Wazuh agent, together with Suricata, analyzes
network traffic in real time, detecting both known signature threats and suspicious anomalies. The
eve.json file generated by Suricata serves as the main source of network events and is sent to the
Wazuh server, where the data is normalized and classified. Based on the matched rules, the system
generates alerts that are filtered by severity level and sent to the developed Telegram bot. The
Telegram Bot API provides instant notification delivery to a dedicated chat, allowing administrators
to quickly respond to critical incidents. This approach ensures minimal delays between the moment
an attack is detected and the responsible parties are notified.</p>
      <p>The initial implementation phase included deploying a virtual infrastructure, configuring
network interfaces, and installing all components. Then, custom rules were created in Wazuh to map
Suricata severity levels to alert priorities. Automatic download of Emerging Threats (ET Ruleset)
signatures was configured to keep the IDS rule base up to date.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Results and analysis</title>
      <p>To quantitatively assess detection accuracy, performance metrics including precision, recall, and
F1score were calculated for each attack type. True positives (TP), false positives (FP), and false negatives
(FN) were derived by matching Wazuh alerts against ground-truth timestamps recorded during
attack simulations. Ground truth entries were logged as CSV lines with attack_id, start_ts (ISO8601),
end_ts (ISO8601), attack_type, attacker_ip. An alert was counted as a True Positive if (1) the alert’s
src_ip matched the ground-truth attacker_ip (exact match or within the same /24 for NAT tests) and
(2) the alert timestamp fell within [start_ts - 1s, end_ts + 1s]. Alerts that did not match any
groundtruth interval were considered False Positives, and ground-truth intervals with no corresponding
alerts were counted as False Negatives.</p>
      <p>The attack traffic was generated continuously for 24 hours under controlled laboratory conditions.
During that period we executed repeated instances of the simulated scenarios (ICMP flood, TCP SYN
flood, Nmap scanning, SSH brute-force, HTTP credential leakage, DNS exfiltration) and captured
PCAPs and logs for deterministic evaluation.</p>
      <p>To enhance the objectivity of the developed system's effectiveness, tests were conducted using
actual cyberattack scenarios (Table 2), as well as baseline testing on regular network traffic. The
results presented were obtained during lab experiments in a virtualized environment and reflect
typical metrics under controlled conditions; minor deviations in metrics are possible when deploying
the system in a corporate infrastructure.</p>
      <sec id="sec-6-1">
        <title>Metrics were computed using the standard formulas: where: TP (True Positives) — number of correctly detected attack events. FP (False Positives) — number of normal traffic events incorrectly classified as attacks. Precision = TP / (TP + FP),</title>
        <p>Recall = TP / (TP + FN),
where FN (False Negatives) — number of undetected attack events missed by the system.</p>
        <p>F1 = 2 * Precision * Recall / (Precision + Recall),
where, Precision — measures the proportion of correctly identified threats among all alerts generated
by the system; Recall — measures the system’s ability to identify all actual attacks present in the
dataset; F1-score — represents the harmonic mean of Precision and Recall, providing a balanced
measure of detection performance.</p>
        <p>Nmap Scan
SSH Brute-force (Hydra)
HTTP Credential Leakage</p>
        <p>DNS Exfiltration</p>
        <p>TP
45
50
32
40
28
10</p>
        <p>FP</p>
        <p>FN</p>
        <p>Precision</p>
        <p>Recall
5
2
4
1
3
0
5
3
6
2
1
2
0.90
0.96
0.89
0.98
0.90
1
0.90
0.94
0.84
0.95
0.97
0.83
(1)
(2)
(3)
F1
0.90
0.95
0.86
0.96
0.93
0.90</p>
        <p>The conducted testing demonstrates that the proposed system, is capable of providing prompt and
reliable detection of cyber threats in conditions similar to real network infrastructure.</p>
        <p>For traffic analysis, logs from Suricata, specifically the eve.json file, were used. This file contains
structured records of network events and is generated on the machine running Suricata. It is then
forwarded to the Wazuh server for further analysis and correlation.The network traffic captured in
eve.json was based on interactions between the Windows User machine and the Attacker Machine,
simulating attack scenarios such as port scanning, brute-force attempts, and other intrusion patterns.
Wazuh, the unified XDR and SIEM platform was utilized for event aggregation, log processing, and
correlation. Although there are predefined rules the custom rules were defined on the system to
classify and manage alerts generated by Suricata based on the severity of the detected threat [18]. The
rules define different levels of alert severity, which are mapped to corresponding Wazuh rules for
further analysis and reporting. Figure 1 confirms that Suricata severity levels were mapped to Wazuh
rules to enable prioritized alerting.</p>
        <p>The system was deployed in a managed virtualized environment using VMware, which provided a
flexible and isolated setup for testing various attack scenarios. This environment allowed us to test
the entire integration of Wazuh, Suricata, and the Telegram Bot API smoothly and reproducibly. The
following attack scenarios were tested: port scanning with nmap, brute-force attack with Hydra, and
search engine attack with Social-Engineer Toolkit.</p>
        <p>One of the test cases tested operating system fingerprinting with Nmap. This is a very popular
technique, which is commonly employed in reconnaissance for cyber-attacks to determine an
operating system for a target host by examining responses to specially formulated network probes.
While the test was being conducted, Nmap's OS detection capability was run against a watched
Windows host from Kali machine.</p>
        <p>Figure 6 confirms that OS scanning was successfully performed using Nmap from the Kali
machine during the simulation.</p>
        <p>Suricata, running in inline mode, could identify the scan and produce alerts for anomalous TCP/IP
stack behavior and probe patterns characteristic of OS fingerprinting. Wazuh labeled this alert as
medium-severity event, displaying it in Wazuh dashboard.</p>
        <p>Figure 7 confirms that the OS scanning activity was detected and correctly displayed as an alert in
the Wazuh Dashboard.</p>
        <p>The Telegram bot that was integrated was received the alert and issued an in-real-time
notification to the specific Telegram chat. The alert contained the severity level and a description of
the behavior being monitored, ensuring that the entire pipeline, from detection to notification,
worked as expected.</p>
        <p>Figure 8 confirms that the OS scanning alert was successfully forwarded to Telegram,
demonstrating real-time notification capability.</p>
        <p>Another scenario was probing the system to see how it reacted to repeated, unauthorized attempts
to log in. This type of attack is used frequently by attackers looking to penetrate systems with a
methodical process of guessing valid combinations of username and password.</p>
        <p>To simulate a brute-force attack scenario in the real world, the Hydra tool was executed from a
Kali Linux virtual machine against an OpenSSH service operating within a Windows host. The
Windows host had an SSH server installed and was being monitored by Wazuh and Suricata.</p>
        <p>Figure 9 confirms the successful deployment of the OpenSSH Server and the creation of a testing
user on the Windows host for brute-force attack simulation.</p>
        <p>Hydra performed a sequence of login attempts at a high frequency with a series of username and
password pairs.</p>
        <p>Figure 10 confirms that an SSH brute-force attack was executed from the Kali machine using
Hydra as part of the simulated threat scenario.</p>
        <p>
          The Wazuh configured with authentication log monitoring, identified the pattern of multiple
failed login attempts in a short time frame. Based on correlation rules, Wazuh generated a
highseverity alert, indicating a potential brute-force attack in progress [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. Prior to the brute-force
activity, a port scan was performed to identify open services, including the SSH port (TCP 22).
Suricata detected this initial reconnaissance step and generated corresponding alerts related to the
scan activity. Both stages, the preliminary port scan and the brute-force attempt were successfully
detected by the integrated Suricata and Wazuh setup.
        </p>
        <p>Figure 11 confirms that the SSH brute-force attack was accurately detected and logged as alerts in
the Wazuh Dashboard.</p>
        <p>The final high-severity alert triggered by the brute-force activity was forwarded to the custom
Telegram bot, which delivered a clear and timely notification to the designated Telegram chat. This
validated the system's ability to detect multi-stage intrusion attempts and provide real-time
situational awareness.</p>
        <p>Figure 12 confirms that the SSH brute-force attack alert was successfully forwarded to Telegram,
providing real-time notification.</p>
        <p>In this attack scenario, an HTTP-based attack was emulated with the use of the Social-Engineer
Toolkit on a Kali virtual machine against a Windows host. During the attack, a straightforward
exploitation of a web application vulnerability was employed where a user could enter his or her
login credentials. During the attack, the login credentials of the user, including a password, were sent
in plain text through the use of the HTTP protocol.</p>
        <p>Figure 13 confirms the execution of a SE attack using the SE Toolkit on the Kali machine during
the simulation.</p>
        <p>Suricata, monitoring the network traffic, detected the unencrypted transmission of sensitive data.
It identified the HTTP request containing the login information, including the cleartext password,
and generated an alert based on this suspicious traffic.</p>
        <p>Wazuh, configured to process network-based alerts from Suricata, correlated the event with a rule
designed to detect the transmission of unencrypted passwords. Upon detection, Wazuh issued a
highseverity alert indicating that sensitive credentials had been sent in cleartext.</p>
        <p>Figure 14 confirms that the SE attack was detected and displayed as an alert in the Wazuh
Dashboard.</p>
        <p>The warning was then sent to the custom Telegram bot, which, in automatic mode, alerted the
specified Telegram chat with information on the incident and severity level. This was evidence of
success of the combined system in identifying unencrypted transmission of credentials and alerting
administrators of possible security risk in advance.</p>
        <p>Notes
OS fingerprinting detected in real
time; Telegram alert delivered
faster than dashboard update
Brute-force activity correctly
correlated and prioritized;
realtime alert validated
Unencrypted password
transmission detected and alerted
Splunk Enterprise Security
identified port scanning activity
and issued a medium-severity
alert using its network traffic
analysis and correlation
mechanisms [18].</p>
        <p>The system correlated multiple
failed logins attempts and
generated a high-severity alert,
effectively indicating an ongoing
brute-force attack [18].</p>
        <p>Splunk detected the unencrypted
transmission of user credentials
and classified it as a high-severity
incident, providing detailed
context for subsequent incident
response [18].</p>
        <p>The comparison showed that the developed system based on Wazuh, Suricata and Telegram Bot
demonstrates a level of detection accuracy comparable to commercial SIEM solutions (Splunk,
QRadar), while remaining significantly more cost-effective. The notification delivery time was less
than one second, which exceeds the speed of notifications in traditional systems using dashboards or
e-mail. The key advantages of the solution are flexible configuration of correlation rules and lack of
vendor dependence, which makes it the best option for organizations with a limited budge.</p>
        <p>The comparison showed that the developed system based on Wazuh, Suricata and Telegram Bot
demonstrates a level of detection accuracy comparable to commercial SIEM solutions (Splunk,
QRadar), while remaining significantly more cost-effective. The notification delivery time was less
than one second, which exceeds the speed of notifications in traditional systems using dashboards or
e-mail. The key advantages of the solution are flexible configuration of correlation rules and lack of
vendor dependence, which makes it the best option for organizations with a limited budge.</p>
        <p>The results of the experiment show that the proposed Wazuh + Suricata + Telegram Bot API
architecture achieves detection performance levels comparable to leading commercial SIEM
solutions such as Splunk or IBM QRadar, which often require significant investments in
infrastructure and licensing [19,20]. Moreover, the open-source nature of the solution allows for
significant savings: implementation and maintenance costs are significantly lower compared to
commercial offerings, making continuous monitoring cost-effective for small and medium-sized
organizations [21]. These results confirm that a modular, open-source approach can provide
enterprise-grade threat detection capabilities while maintaining visibility, flexibility, and
costeffectiveness.</p>
        <p>Using Telegram introduces data security considerations. All communications occur via HTTPS,
and the bot validates messages through a preconfigured chat_id whitelist. Sensitive information such
as payloads or credentials is never transmitted over Telegram. Data retention and backup policies
ensure that all logs and PCAPs are encrypted using LUKS and rotated every 30 days. Backups are
automatically mirrored to a secure off-site repository. This minimizes risks associated with external
platform integration.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusion</title>
      <p>The study addressed a key scientific objective: developing and experimentally validating the
effectiveness of an integrated architecture for network threat detection and alerting. This
architecture combines the functionality of Wazuh (SIEM), Suricata (IDS/IPS), and the Telegram Bot
API into a single modular platform. The research's novelty lies in the development of a
comprehensive approach that combines event correlation, network traffic analysis, and instant
alerting mechanisms within a single adaptive solution. For the first time, an architecture has been
proposed that provides an optimal balance between incident detection accuracy, system response
speed, and configuration flexibility with minimal operational costs. The results of experimental
testing confirmed the proposed architecture's high effectiveness in detecting various types of
cyberattacks—from ICMP/TCP floods and network scanning to SSH brute-force attacks, SQL
injections, and DNS exfiltration. The calculated results demonstrated a precision of 0.90–0.98 and a
recall of 0.83–0.97, with an average F1 value of 0.93, indicating high threat classification accuracy and
resistance to false alarms. The average delay in notification delivery via the Telegram Bot API was
approximately one second, ensuring a real-time system response.</p>
      <p>A comparative analysis with commercial SIEM platforms (Splunk, QRadar) showed comparable
accuracy and performance. Thus, the use of open source software confirms the feasibility of creating
effective, scalable, and cost-effective enterprise-grade security solutions without relying on
proprietary technologies. The practical value of this work lies in the development of a reproducible
architecture adapted for use in research laboratories, educational institutions, and
resourceconstrained organizations.</p>
      <p>Future research opportunities include integrating machine learning algorithms [22] for intelligent
anomaly detection, expanding automated incident response capabilities, and adapting the system to
hybrid and cloud infrastructures to improve predictability, scalability, and resilience against
multistage cyberattacks.</p>
    </sec>
    <sec id="sec-8">
      <title>Declaration on Generative AI</title>
      <sec id="sec-8-1">
        <title>The authors have not employed any Generative AI tools.</title>
        <p>[13] Yakubova, M.; Serikov, T.; Manankova, O. Development and Research of a Method for
MultiLevel Protection of Transmitted Information in IP Networks Based on Asterisk IP PBX
Using Various Codecs. Int. J. Adv. Comput. Sci. Appl. 2024, 15(7), 724–731.
[14] M. Almiani, A. Razaque, B. Alotaibi, S. Amanzholova and A. Alotaibi, "An Efficient
DataBalancing Cyber-Physical System Paradigm for Quality-of-Service (QoS) Provision over Fog
Computing," Applied Sciences, vol. 12, no. 1, p. 246, 2022, doi: 10.3390/app12010246.
[15] Mubarakova, S. R., Amanzholova, S. T., &amp; Uskenbayeva, R. K. (2022). Using machine learning
methods in cybersecurity. Eurasian Journal of Mathematical and Computer Applications, 10(1),
69–78.
[16] ENISA Threat Landscape 2024, European Union Agency for Cybersecurity. DOI: 10.2824/401373.
[17] IBM QRadar Security Intelligence Platform. Product Overview, 2024.
[18] Claise, B., et al. (2023). Comparative Evaluation of Snort and Suricata IDS in Enterprise</p>
        <p>Networks. Journal of Network Security, 15(3), 102–117.
[19] B. Pandey, K. Kumar, P. Pandey, L. Aldasheva, B. Altaiuly, and W. A. W. A. Bakar, Cryptography
tools in ethical hacking. 2025. doi: 10.1201/9781003508632-15.
[20] Amanzholova, S., Galimkair, M., Муханов, С., Olga, U., &amp; Razaque , A. (2025). AI-Powered
System for Network Activity Monitoring and Detection of SQL Injection Attacks Using Zabbix
and Grafana. International Journal of Information and Communicatin Technologies, 6(3), 61–83.
https://doi.org/10.54309/IJICT.2025.23.3.004.
[21] Ussatova, O., Makilenov, S., Karyukin, V., Razaque, A., Amanzholova, S. The Development of an
Evaluation Model for User Authentication Methods with Security, Usability, and Usage
Frequency // Eastern-European Journal of Enterprise Technologies. — 2025. doi:
10.15587/17294061.2025.333720.
[22] Hamada, M., Abiche, A., &amp; Hamada, G. (2023). Using the machine learning models to optimize
time management in logistics and supply chain management systems.
https://ceur-ws.org/Vol-3966/W3Paper6.pdf.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.H.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          .
          <year>2024</year>
          .
          <article-title>Security and Threat Detection through Cloud-Based Wazuh Deployment</article-title>
          .
          <source>International Journal of Computer Applications</source>
          ,
          <volume>182</volume>
          (
          <issue>4</issue>
          ),
          <fpage>25</fpage>
          -
          <lpage>31</lpage>
          . DOI:
          <volume>10</volume>
          .1109/KHIHTC60760.
          <year>2024</year>
          .
          <volume>10482206</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Rahmawati</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2024</year>
          ).
          <article-title>Enhancing Network Security Through Real-Time Threat Detection with Intrusion Prevention System (Case Study on Web Attack)</article-title>
          .
          <source>Jurnal Ilmiah Teknik Elektro Komputer dan Informatika</source>
          ,
          <volume>10</volume>
          (
          <issue>4</issue>
          ),
          <fpage>1004</fpage>
          -
          <lpage>1020</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Satrio</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>Send OpenSearch Dashboard Alert via Telegram Messenger</article-title>
          .
          <source>ITSEC Asia Research &amp; Technology.</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Lisnevskyi</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Askarbekova</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lisnevskyi</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Babenko</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alin</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ihor</surname>
            <given-names>D.</given-names>
          </string-name>
          <article-title>Using Kali Linux as a Method of Defense Against Attacks (</article-title>
          <year>2025</year>
          )
          <article-title>SIST 2025 -</article-title>
          2025
          <source>IEEE 5th International Conference on Smart Information Systems and Technologies, Conference Proceedings, doi: 10.1109/SIST61657</source>
          .
          <year>2025</year>
          .
          <volume>11139305</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Babenko</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolesnikova</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lisnevskyi</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makilenov</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Landovsky</surname>
            <given-names>Y</given-names>
          </string-name>
          . Definition of Cryptojacking Indicators (
          <year>2024</year>
          ) CEUR Workshop Proceedings,
          <volume>3680</volume>
          , https://www.scopus.com/inward/record.uri?eid=
          <fpage>2</fpage>
          -
          <lpage>s2</lpage>
          .
          <fpage>0</fpage>
          -
          <lpage>85192508442</lpage>
          &amp;partnerID=
          <volume>40</volume>
          &amp;md5=
          <fpage>3dfe1914b48d27c693ac1db293ed15c5</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Setiawan</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Sulistyo</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>SIEM (Security Information Event Management) Model for Malware Attack Detection Using Suricata and Evebox</article-title>
          .
          <source>International Journal of Engineering Technology and Natural Sciences</source>
          ,
          <volume>5</volume>
          (
          <issue>2</issue>
          ),
          <fpage>138</fpage>
          -
          <lpage>147</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Wasswa</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lynar</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nanyonga</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Abbass</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2025</year>
          ).
          <article-title>IoT Botnet Detection: Application of Vision Transformer to Classification of Network Flow Traffic</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Alanda</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring</article-title>
          .
          <source>Jurnal Teknologi Informasi dan Ilmu Komputer</source>
          ,
          <volume>7</volume>
          (
          <issue>2</issue>
          ),
          <fpage>56</fpage>
          -
          <lpage>62</lpage>
          . DOI:
          <volume>10</volume>
          .25077/jitce.7.2.
          <fpage>56</fpage>
          -
          <lpage>62</lpage>
          .
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>T.</given-names>
            <surname>Davies</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.H.</given-names>
            <surname>Eiza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shone</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Lyon</surname>
          </string-name>
          .
          <year>2025</year>
          .
          <article-title>A Collaborative Intrusion Detection System Using Snort IDS Nodes</article-title>
          .
          <source>arXiv preprint arXiv:2504</source>
          .16550. Available at: https://arxiv.org/abs/2504.16550.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D.</given-names>
            <surname>Palko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hnatiienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Babenko</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Bigdan</surname>
          </string-name>
          , “
          <article-title>Determining key risks for modern distributed information systems</article-title>
          ,
          <source>” CEUR Workshop Proceedings</source>
          ,
          <year>2021</year>
          . [Online]. Available: https://www.scopus.com/record/display.uri?eid=
          <fpage>2</fpage>
          -
          <lpage>s2</lpage>
          .
          <fpage>0</fpage>
          -
          <lpage>85120940899</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>T.</given-names>
            <surname>Babenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hnatiienko</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Vialkova</surname>
          </string-name>
          , “
          <article-title>Modeling of the integrated quality assessment system of the information security management system</article-title>
          ,
          <source>” CEUR Workshop Proceedings</source>
          ,
          <year>2021</year>
          . [Online]. Available: https://www.scopus.com/record/display.uri?eid=
          <fpage>2</fpage>
          -
          <lpage>s2</lpage>
          .
          <fpage>0</fpage>
          -
          <lpage>85104030744</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Babenko</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Amanzholova</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lisnevskyi</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abylgazy</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Cybersecurity-level assessment models (</article-title>
          <year>2025</year>
          ) CEUR Workshop Proceedings,
          <volume>3966</volume>
          , https://www.scopus.com/inward/record.uri?eid=
          <fpage>2</fpage>
          -
          <lpage>s2</lpage>
          .
          <fpage>0</fpage>
          -
          <lpage>105006928135</lpage>
          &amp;partnerID=
          <volume>40</volume>
          &amp;md5=
          <fpage>9e153080855fae60730f5fdf2d73067b</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>