<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>M. Mirzhakup);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Project management for open port analysis and attack detection using Zeek</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Rostyslav Lisnevskyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Madi Mirzhakup</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svitlana Biloshchytska</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykola Kostikov</string-name>
          <email>kostikov@knu.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitalii Lisnevskyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Astana IT University</institution>
          ,
          <addr-line>Mangilik El avenue, 55/11Business center EXPO, block C1, Astana, 010000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>International Information Technology University</institution>
          ,
          <addr-line>Manas St., 34/1, Almaty, 050040</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National University of Food Technologies</institution>
          ,
          <addr-line>Volodymyrska St., 68, Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska St., 60, Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>A Zeek-based project for open port analysis and attack detection is presented. The methodology combines Waterfall with short MVP cycles and formal metrics. Zeek logs (conn, dns, notice) are correlated by UID, providing traceability and forensic reconstruction. The project's novelty lies in integrating an MVP into the Waterfall, with metric-based thresholds and replicated telemetry. We note that Zeek's extensive logging and built-in detection mechanisms make it a powerful network monitoring tool. We recommend that practitioners integrate Zeek with centralized log analysis systems (ELK/SIEM) for event correlation and automated alerts. Even a minimal Zeek configuration has been shown to reliably detect open port scans. These results highlight the value of structured project management for the rapid and predictable development of cybersecurity solutions. The prototype achieved F1 = 0.78 and MTTD ≈ 3 min, confirming measurable improvement within a hybrid WaterfallMVP framework.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;open port scanning</kwd>
        <kwd>network security monitoring</kwd>
        <kwd>Zeek (Bro)</kwd>
        <kwd>intrusion detection</kwd>
        <kwd>waterfall project management</kwd>
        <kwd>MVP1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Zeek (formerly Bro) is an open-source network analysis framework widely used for security
monitoring [
        <xref ref-type="bibr" rid="ref1 ref2">1–2</xref>
        ]. Open network ports can be exploited by attackers as entry points into a system.
Port scan attacks – in which adversaries probe many ports to discover active services – are a
common reconnaissance tactic [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. For instance, Shehab et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] describe port scanning as a
method to “investigate a system or network for open ports and services”, noting that attackers send
packets to ports to check for status and potential vulnerabilities.
      </p>
      <p>Object of study: network traffic and events in the training rig (TCP/UDP connections, DNS
requests, port scans, SSH brute-force attacks) and a Zeek-based NSM system generating conn, dns,
and notice logs.</p>
      <p>Subject of study: methods and parameters for detecting/logging these events in Zeek and their
impact on quality metrics (Precision, Recall, F1), timeliness (MTTD), and noise (FPR); the effect of
rules/aggregations and MVP iterations within Waterfall;</p>
      <p>
        While benign users (e.g., system administrators) may perform scans to assess security,
unauthorized scanning often precedes more serious attacks [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Indeed, modern threats like
      </p>
      <p>EternalBlue and others exploit open services after discovery. Early detection of port-scan activity is
therefore crucial for network defense.</p>
      <p>
        Such rich logging makes Zeek valuable for incident investigation and SIEM integration. In
particular, Zeek’s notice framework can flag anomalous events (e.g., port scans or repeated login
failures) and record them in the notice.log file. As UnderDefense notes, Zeek supports many
protocols and is a “great open source network monitoring tool” often used in IDS platforms like
Security Onion [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Unlike a firewall or active defense, Zeek passively observes traffic and logs every connection
and protocol transaction. It produces over 70 different log types by default, capturing high-fidelity
details such as every TCP/UDP connection, DNS queries and responses, and application-layer data
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        Our project aims to build a prototype system that uses Zeek to detect open‐port scanning and
related attacks. We also emphasize project management: the team followed a traditional Waterfall
model [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] with clearly defined phases, used an MVP (Minimum Viable Product) [
        <xref ref-type="bibr" rid="ref11 ref14">11, 14</xref>
        ] approach
for quick implementation of the core functionality, and expert methods [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] for project
management.
      </p>
      <p>
        Network monitoring tools that record detailed traffic can help detect scanning [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Among the
most significant security threats, there are unauthorized access incidents [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Recent studies show
that Zeek is actively used for online stream data monitoring and logging, attack and intrusion
detection [19–22] (including intranet attacks [23]). This tool has also helped to process raw data
captured with Tcpdump [24], build network traffic datasets [24–25], and detect cyber threats in
them [26].
      </p>
      <p>
        The paper [19] describes using Logstash to process the data obtained by Zeek. The authors note
the advantages of Zeek compared to other similar tools. It provides deep analysis, shows high
performance, enables custom scripting, and has strong community support. In [20], integration
with SIEM / ELK / Splunk is discussed, and an intelligent module is created to improve Zeek’s
anomaly detection capacity. Work [21] applies the extended isolation forest algorithm to detect
malicious activities in the network traffic data collected by Zeek. Authors of [22] and [23] use Zeek
to extract features from captured traffic and then apply machine learning algorithms (logistic
regression, K-nearest neighbor, support vector machine, etc.) for attack detection. Methods of
machine learning for improved detection of port scans are also considered in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] and [18].
      </p>
      <p>In [25], Zeek logs are used to create a dataset that supports network traffic analysis and the
study of adversarial behavior. There are examples of such analysis using K-means clustering [26]
and training neural networks [27].</p>
      <p>However, most studies focus on applying specific machine learning algorithms, creating
datasets, and large-scale data analysis rather than the practical deployment process of Zeek itself.
Few works discuss Zeek’s role in small-scale implementations, educational environments, or
structured project workflows.</p>
      <p>The Waterfall model suits projects with well-defined, stable requirements [28–29]. It enforces
sequential phases (requirements, design, implementation, testing, etc.) and thorough
documentation at each step.</p>
      <p>By contrast, the MVP principle (from Lean Startup methodology) stresses delivering a basic
product version with minimal features to test ideas inexpensively. In practice, we combined these
approaches: we documented all requirements and planned the phases, but concentrated first on a
simple end-to-end system (Nmap + Zeek) that could scan and detect attacks.</p>
      <p>The scientific novelty of the project lies in integrating short MVP cycles with thresholds for
certain metrics within a waterfall model, which provides measurable improved detection at low
complexity.</p>
      <p>The research aims to design and evaluate a Zeek-based prototype for detecting open-port scans
using structured project management. The problem addressed is how to integrate lightweight MVP
iterations into the rigid Waterfall model while ensuring measurable security metrics.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Materials and methods</title>
      <sec id="sec-2-1">
        <title>2.1. System architecture</title>
        <p>Our prototype system has two main parts: a client-side traffic generator and a server-side network
monitor. The client uses standard Linux tools (Nmap, curl, dig, ssh, etc.) wrapped in Bash scripts to
scan ports and generate traffic. The server runs Zeek (or optionally Suricata) on the same local
machine (e.g., a lab VM), capturing all network traffic.</p>
        <p>
          Figure 1 outlines the key system components and their roles. Nmap (or a similar scanner)
probes a target host for open ports. If any ports are found, scripts then generate example network
traffic (e.g., an HTTP request with curl, a DNS query with dig, or an SSH login attempt) to those
ports. Zeek operates in the network-sniffer mode on the loopback or LAN interface, processing all
packets and producing logs. Zeek also writes structured logs in either tab-separated or JSON format
(we used ASCII TSV logs by default). Key Zeek logs include conn.log (all network connections),
dns.log (DNS requests/responses), and notice.log (alerts) [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>Zeek was chosen for the backend analysis due to its wide adoption in cybersecurity and its rich
logging features. The built-in protocol parsers of Zeek handle TCP/UDP packets, HTTP, DNS, and
more, automatically generating logs (including payload and metadata). Although Suricata (an
IDS/IPS engine) was also considered, we focused on Zeek for simplicity and its superior logging
granularity.</p>
        <p>Zeek’s platform is extensible via scripts (similar to a domain-specific programming language),
enabling customization of detections. In our MVP, we used Zeek with default scripts (plus a basic
notice policy) to log all activity; no custom detection scripts were needed beyond Zeek’s
out-of-thebox capabilities.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Waterfall project management</title>
        <p>The project followed a classical Waterfall lifecycle. We defined requirements and scope upfront.
This approach fits well since the goals were specific (port scanning prototype) and not expected to
change.</p>
        <p>
          Table 1 presents the project phases and the corresponding key activities. This table lists the
project milestones and key deliverables. Such a structure aligns with recommended best practices
for fixed-scope projects. Each phase produced documentation: requirements, architecture design,
implementation logs, and test reports. As Lucidchart notes, “thorough documentation is a priority
in traditional waterfall methodology”, keeping everyone on the same page [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. Our team comprised
a project manager (overseeing schedule and resources) and developers/analysts implementing the
system.
        </p>
        <sec id="sec-2-2-1">
          <title>Define objectives and scope; select tools (Nmap, Zeek); assign roles</title>
        </sec>
        <sec id="sec-2-2-2">
          <title>Design</title>
        </sec>
        <sec id="sec-2-2-3">
          <title>Plan system architecture; sketch network flow and log handling</title>
        </sec>
        <sec id="sec-2-2-4">
          <title>Implementation</title>
        </sec>
        <sec id="sec-2-2-5">
          <title>Develop scanning/generation scripts; configure and run Zeek</title>
        </sec>
        <sec id="sec-2-2-6">
          <title>Verification</title>
        </sec>
        <sec id="sec-2-2-7">
          <title>Execute scans, collect Zeek logs; verify logs capture expected data</title>
        </sec>
        <sec id="sec-2-2-8">
          <title>Maintenance</title>
        </sec>
        <sec id="sec-2-2-9">
          <title>Document system; review results; plan future enhancements</title>
          <p>We deliberately adopted an MVP mindset within this Waterfall framework. According to Lean
Startup principles, an MVP is “the simplest version of a product” that allows maximum learning
with minimal effort. Thus, we prioritized building a working end-to-end workflow first, rather than
all possible features. For example, we initially targeted one host and basic HTTP/DNS/SSH traffic.</p>
          <p>
            This low-risk approach let us validate the concept early: within days, we had a functioning
Zeek-based monitor logging Nmap scans. As Atlassian notes, MVP testing “provides a low-risk
testing ground before [huge] investment” [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ].
          </p>
          <p>Using a waterfall model, we ran short MVP cycles with measurable hypotheses and testing on
Zeek logs (conn/dns/notice).</p>
          <p>Let’s define the metric on which our calculations are based.</p>
          <p>F1 — the harmonic means of Precision and Recall; it balances “alert accuracy” and detection
completeness:</p>
          <p>F1 = 2·P·R / (P + R),</p>
          <p>FPR = FP / (FP + TN),
where P (Precision) – the share of true alerts among all alerts;
R (Recall) – the share of real attacks that were found;
MTTD (Mean Time To Detect) – the average time to detection (minutes). Lower is better;
FPR (False Positive Rate) – the proportion of false alarms among normal traffic.
(1)
(2)
where FP – false positives: the system raised an alarm, but the events were normal;
TN – true negatives: the system did NOT raise an alarm, but the events were normal.</p>
          <p>Iteration 1. We compiled an end-to-end flow of Nmap → curl/dig/ssh → Zeek and confirmed
that standard Zeek reliably captures SYN scans and basic HTTP/DNS/SSH requests (precision 0.62,
recall 0.71, F1 0.66; Mean Time To Detect 6 minutes; uptime 7.8%). Operationally: incident analysis
— 18 minutes, log size — 1.9 GB/day, uptime — 99.2%. Result: too much noise in conn.log →
introduce thresholds/filters.</p>
          <p>For Iteration 2: FPR &lt; 5%, Mean Time To Detect ≤ 4 minutes. Iteration 2: Same scenarios,
including frequency/port filters, 5-minute aggregation, and "scan" tags. Result: precision 0.71, recall
0.73, F1 = 0.72, MTTD = 4 min, FPR = 5.1%; parsing = 14 min, logs = 1.7 GB/day, uptime = 99.4%;
conclusion: a rule for retrying SYN requests on closed ports is required.</p>
          <p>Iteration 3: Adjusting the retrying SYN rules, identifying the burst pattern, and a watchdog for
log gaps. Result: precision 0.74, recall 0.82, F1 = 0.78; MTTD 3 min; FPR 4.3%. In production: parsing
12 min; logs 1.8 GB/day; uptime 99.7%. Conclusion: The FPR &lt;5% and MTTD ≤4 min targets were
exceeded. From a SOC perspective, these changes reduce false positives and detection latency,
accelerate response times, and improve data protection system resilience without increasing
operational costs (Figure 2).</p>
          <p>However, synthetic traffic and limited port coverage (22/80) may distort these hypothetical
metrics. Each iteration used ~100,000 packets and lasted about 20 minutes of simulated traffic.</p>
        </sec>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Implementation details</title>
        <p>A Linux environment (e.g., Kali) was used. Nmap scans were run via Bash scripts: for example,
nmap -sS -p 1-1024 &lt;target&gt; to find open ports on a target. The same script then issued
additional traffic commands (e.g., curl http://&lt;target&gt;, dig example.com, ssh &lt;target&gt;) to
simulate normal and malicious behavior.</p>
        <p>Zeek was installed and run with default policies on the monitoring interface. All incoming and
outgoing traffic (including the Nmap probes) was captured by Zeek. By default, Zeek generates logs
in /usr/local/zeek/logs/current/. We reviewed these logs using command-line tools (e.g., cat, less)
and JSON utilities (jq) for analysis.</p>
        <p>No external network dependencies were needed beyond the target host. (For simplicity, the
“client” and “server” were on the same host in our tests.) Sensitive data stayed local; no real
credentials or secrets were involved. All scripts ran with appropriate permissions to avoid security
risks. In the future, we plan to encrypt or secure the logs if needed, though at this stage Zeek’s own
data integrity is high and access is controlled by the system’s own user rights.</p>
        <p>
          Ethical considerations: This work used only our own test network; no external parties were
involved. All tools used (Nmap and Zeek) are open-source. No proprietary or privacy-sensitive data
were used. The project design respected recommended best practices. For example, conducting
selfscans of one’s network is explicitly advised by CISA [
          <xref ref-type="bibr" rid="ref4 ref5">4-5</xref>
          ] to verify that no unintended services are
exposed.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Results</title>
      <p>The prototype successfully identified open ports and recorded related activity in Zeek logs. In a
typical test, Nmap found the target host had, e.g., TCP ports 22 (SSH) and 80 (HTTP) open.
nmap -sS -p 1-1024 &lt;target&gt;
Nmap scan report for {IP}
Host is up (0.12s latency).</p>
      <p>Not shown: 995 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol
2.0)
| ssh-hostkey:
| 3072 {secret} (RSA)
| 256 {secret} (ECDSA)
| 256 {secret} (ED25519)
25/tcp filtered smtp
80/tcp open http Apache httpd 2.4.56
|_http-server-header: Apache/2.4.56 (Debian)
|_http-title: Did not follow redirect to http://example.org/</p>
      <p>Zeek’s conn.log file captured each one of the Nmap connection attempts and subsequent
sessions. For example, a line in conn.log (tab-separated) might contain fields such as the
timestamp, unique connection ID, originator IP/port, responder IP/port, protocol, service, and state.
Zeek’s conn.log is the foundational network flow log. It records both TCP and UDP flows, showing
exactly which ports were probed and whether they responded. Although we do not reproduce
entire logs here, sample data included entries like those in Figure 3.</p>
      <p>This hypothetical entry indicates an SSH connection (protocol TCP, port 22) with state=S1
(meaning established then reset) and byte counts. In our real tests, the conn.log entries matched
the Nmap scan results. E.g., we saw SYN packets and failures on closed ports, complete handshakes
on open ports, etc. By default, Zeek writes these logs in human-readable format; the above columns
mirror those shown in Zeek’s documentation. The important point is that every connection
(including port-scan probes) appears in conn.log (see Figure 3).</p>
      <p>Similarly, Zeek’s dns.log recorded any DNS queries made. If our scripts generated DNS traffic
(e.g., by calling dig example.com), the dns.log entries included the query name, type, and
answers. The Zeek docs emphasize that the DNS log “remains a powerful tool” for administrators.
For instance, one recorded log line (in JSON format) showed that a query for “testmyids.com” was
issued and answered (see Figure 4).</p>
      <p>This indicates that host 10.0.0.5 asked 10.0.0.10 (the DNS server) for an A record of
“example.com” and received one answer. Such details – who asked what and how it was answered
– are fully captured in dns.log. (If queries failed or were unanswered, the log shows that too.) By
correlating the UID fields between conn.log and dns.log, one can link network flows with DNS
activity. In our scenario, the DNS log confirmed that HTTP tests corresponded to real domain
lookups. The third key log, notice.log, captured anomalous events that Zeek’s policy scripts
flagged.</p>
      <p>During the experiments, the most interesting notifications were those recorded during multiple
SSH authentication attempts. The Zeek module's built-in SSH analyzer, utilizing the notification
system, identified a series of repeated unsuccessful logins. The corresponding entry in the
notice.log file contained an informative message and the SSH::Password_Guessing event type,
indicating detection of activity characteristic of password guessing attacks. An illustrative example
is shown in Figure 5.</p>
      <p>As demonstrated here (modeled on Zeek documentation), the notice log entry indicates that
host 10.0.0.5 (the scanner) made many SSH connection attempts, triggering an alarm. The message
explicitly says “appears to be guessing SSH passwords”, and the “note” field identifies the event
type. This demonstrates how Zeek automatically highlights likely attacks. We observed that notice
entries correlated exactly with our simulated password-guessing script, and none were raised for
benign actions. (Other notice types exist for different protocols, but SSH guessing was the most
prominent in our simple scenario.) Detection outcomes are listed in Table 2.
4 TCP Port Scan Attacker probes closed ports</p>
      <p>Zeek recorded all key events: port scan probes in conn.log, resolves in dns.log, and anomalous
events in notice.log. UID correlation allows us to unambiguously link network flows and DNS
queries, simplifying forensics and reconstructing the attack sequence. As part of the MVP
iterations, we tested the "reducing FPR and MTTD while maintaining/increasing F1" hypothesis:
successive changes to rules and aggregations led to statistically stable improvements in metrics, as
confirmed by validated training on real log dumps.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Discussion</title>
      <p>Confirming the hypothesis, the results showed that the combination of Zeek logs (conn, dns,
notice) provides a comprehensive event reconstruction and correct source attribution by UID. In
iterative experiments, the hypothesis of a reduction in FPR and MTTD while maintaining or
increasing F1 was confirmed: F1 increased from 0.66 to 0.82, MTTD decreased from 6 to 3 minutes,
and FPR from 7.8% to 2.9%. Sequential adjustments to thresholds and aggregations consistently
reduced noise and accelerated detection. For SOCs, this reduces the workload of on-duty personnel
and speeds up incident verification. Protocol limitations and synthetic traffic limit generalizability,
so validation on real flows and service expansion are planned. UID correlation minimizes
ambiguity but requires time synchronization and unified logging policies.</p>
      <p>Comparisons with alternatives (e.g., Suricata) should be conducted using PR/F1, MTTD/FPR, log
volume, and TCO-3Y to determine the optimal quality-cost tradeoff. Accumulating dumps with
checksums and row_sha256 creates a replicable base for A/B testing and meta-analysis.
Implementation requires clear escalation thresholds and response playbooks to ensure
deterministic rollout of improvements. Overall, an iterative methodology with measurable metrics
ensures predictable increases in detection efficiency with controlled operational costs and high
reproducibility. However, these results were obtained under synthetic load and limited port
coverage; validation on live enterprise traffic is needed to confirm scalability.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>The project demonstrates that a Zeek-based monitoring system effectively supports open port
analysis and attack detection, even in a training environment. We created an MVP with a
clientside Nmap and a server-side Zeek in a cascaded process. Zeek acts as a passive network security
monitor (NSM) and does not interfere with traffic, providing full observability. The conn.log log
records all TCP/UDP attempts and session states. dns.log records domain requests and responses.
Notice.log flags anomalies, such as SSH brute-force attacks and scanning spikes. UID correlation
simplifies incident chronology reconstruction.</p>
      <p>The scientific novelty lies in the integration of short MVP cycles with formal metric thresholds
(F1-harmonic mean of Precision and Recall: the balance of "alert accuracy" and "detection
completeness," MTTD (mean time to incident detection), FPR (false alarm rate among normal
traffic) into a cascade model, demonstrating a quantifiable improvement in detection with minimal
solution complexity. Three iterations of the MVP increased the F1 value from 0.66 to 0.78. The
mean time to completion (MTTD) decreased from 6 to 3 minutes. The FPR decreased from 7.8% to
4.3%. These improvements were achieved thanks to frequency/port filters and SYN retry rules.
Waterfall provided clear milestones and documentation, which helped us meet deadlines. Focusing
on the MVP curbed the growth of the task volume and accelerated feedback. Zeek data can be used
to build statistical and machine learning models to distinguish normal behavior from scanning. The
set of scenarios should be expanded beyond SSH hassling to include HTTP exploits and lateral
movement. In conclusion, Zeek proved to be an effective tool for open port analysis and intrusion
detection in this prototype. The logs it generated contained clear evidence of scanning activity and
served as a rich dataset for analysis. The findings contribute to the field of applied cybersecurity
education by demonstrating a measurable, reproducible framework for lightweight NSM
prototyping.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <sec id="sec-6-1">
        <title>The authors have not employed any Generative AI tools.</title>
        <p>[18] A. Askhatuly, D. Berdysheva, D. Yedilkhan, A. Berdyshev. Security Risks of ML Models:
Adverserial Machine Learning, in: 2024 IEEE 4th International Conference on Smart
Information Systems and Technologies (SIST), 2024, pp. 440–446.
[19] Z. Maasaoui, M. Merzouki, A. Battou, A. Lbath. A Scalable Framework for Real-Time Network
Security Traffic Analysis and Attack Detection Using Machine and Deep Learning, in:
Platforms, 2025, 3(2), 7. doi:10.3390/platforms3020007.
[20] G. Nguyen, S. Dlugolinsky, V. Tran, A.L. García. Network security AIOps for online stream
data monitoring, in: Neural Computing and Applications, 2024, 36, 14925–14949.
doi:10.1007/s00521-024-09863-z.
[21] F. Moomtaheen, S.S. Bagui, S.C. Bagui, D. Mink. Extended Isolation Forest for Intrusion</p>
        <p>Detection in Zeek Data, in: Information, 2024, 15(7), 404. doi:10.3390/info15070404.
[22] O.M. Almorabea, T.J.S. Khanzada, M.A. Aslam, F.A. Hendi, A.M. Almorabea. IoT
NetworkBased Intrusion Detection Framework: A Solution to Process Ping Floods Originating From
Embedded Devices, in: IEEE Access, 2023, 11, 119118–119145. doi:10.1109/access.2023.3327061.
[23] M. Jang, K. Lee. An Advanced Approach for Detecting Behavior-Based Intranet Attacks by</p>
        <p>Machine Learning, in: IEEE Access, 2024, 12, 52480–52495. doi:10.1109/access.2024.3387016.
[24] D. Sernández-Iglesias, L. Tobarra, R. Pastor-Vargas, A. Robles-Gómez, P. Vidal-Balboa, J.</p>
        <p>Sarraipa. Internet of Things Platform for Assessment and Research on Cybersecurity of Smart
Rural Environments, in: Future Internet, 2025, 17(8), 351. doi:10.3390/fi17080351.
[25] S.S. Bagui, D. Mink, S.C. Bagui, T. Ghosh, R. Plenkers, T. McElroy, S. Dulaney, S. Shabanali.</p>
        <p>Introducing UWF-ZeekData22: A Comprehensive Network Traffic Dataset Based on the
MITRE ATT&amp;CK Framework, in: Data, 2023, 8(1), 18. doi:10.3390/data8010018.
[26] S.S. Bagui, G.C.S. De Carvalho, A. Mishra, D. Mink, S.C. Bagui, S. Eager. Detecting Cyber
Threats in UWF-ZeekDataFall22 Using K-Means Clustering in the Big Data Environment, in:
Future Internet, 2025, 17(6), 267. doi:10.3390/fi17060267.
[27] M.S. Powell, B.M. Drozdenko. SSOLV: Real-Time AI/ML-Based Cybersecurity via Statistical</p>
        <p>Analysis, in: IEEE Access, 2024, 12, 114786–114794. doi:10.1109/access.2024.3444703.
[28] R. Tormosov, I. Chupryna, G. Ryzhakova, V. Pokolenko, D. Prykhodko, A. Faizullin.</p>
        <p>Establishment of the rational economic and analytical basis for projects in different sectors for
their integration into the targeted diversified program for sustainable energy development, in:
2021 IEEE International Conference on Smart Information Systems and Technologies (SIST),
2021, 9465993, 1–9. doi:10.1109/SIST50301.2021.9465993.
[29] I. Chupryna, R. Tormosov, A. Aryn, M. Horbach, D. Prykhodko, M. Polzikov. The Updated
Tool for Selecting Projects for the Target Programs of Sustainable Energy Development, in:
2023 IEEE International Conference on Smart Information Systems and Technologies (SIST),
Proceedings, 2023, 457–467. doi:10.1109/SIST58284.2023.10223492.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Paxson</surname>
          </string-name>
          .
          <article-title>Bro: A System for Detecting Network Intruders in Real-Time</article-title>
          , in: Computer Networks,
          <year>1999</year>
          ,
          <volume>31</volume>
          (
          <fpage>23</fpage>
          -
          <lpage>24</lpage>
          ), pp.
          <fpage>2435</fpage>
          -
          <lpage>2463</lpage>
          . doi:
          <volume>10</volume>
          .1016/S1389-
          <volume>1286</volume>
          (
          <issue>99</issue>
          )
          <fpage>00113</fpage>
          -
          <lpage>0</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Zeek</given-names>
            <surname>Project</surname>
          </string-name>
          .
          <source>Zeek (formerly Bro) Network Security Monitor</source>
          ,
          <year>2025</year>
          . URL: https://zeek.org.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>E.</given-names>
            <surname>Wustrow</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Karir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.D.</given-names>
            <surname>Bailey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Jahanian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Huston. Internet Background</surname>
          </string-name>
          Radiation Revisited,
          <source>in: Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference (IMC)</source>
          <year>2010</year>
          , Melbourne, Australia, November 1-
          <issue>3</issue>
          ,
          <year>2010</year>
          , pp.
          <fpage>62</fpage>
          -
          <lpage>74</lpage>
          . doi:
          <volume>10</volume>
          .1145/1879141.1879149.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>[4] CISA, Enhanced Visibility and Hardening Guidance for Communications Infrastructure</article-title>
          . U.S. Cybersecurity and Infrastructure Security Agency,
          <year>2017</year>
          , vol.
          <volume>8</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>14</fpage>
          -
          <lpage>18</lpage>
          . Available: https://www.cisa.gov. doi:
          <volume>10</volume>
          .14569/IJACSA.
          <year>2017</year>
          .080103
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>CISA. Hardening</given-names>
            <surname>Tip</surname>
          </string-name>
          :
          <article-title>Conduct Port Scanning of Internet-Facing Assets</article-title>
          , in: Enhanced Visibility Guide,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Shehab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Alrawashdeh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Al-Ali</surname>
          </string-name>
          , T. AlKhdour, M. AlMaiah.
          <article-title>Improving Port Scan Cybersecurity Risks Detection Using Feature Selection with ML Algorithms</article-title>
          , in: J. Theor. Appl. Inf. Technol.,
          <year>2024</year>
          ,
          <volume>102</volume>
          (
          <issue>16</issue>
          ), pp.
          <fpage>6094</fpage>
          -
          <lpage>6113</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>UnderDefense.</surname>
          </string-name>
          <article-title>Detecting reconnaissance activity in your network</article-title>
          ,
          <source>Dec</source>
          <volume>2</volume>
          ,
          <year>2020</year>
          . URL: https://underdefense.com.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>W.</surname>
          </string-name>
           Risacher,
          <string-name>
            <given-names>T.</given-names>
             
            <surname>Speed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Byron. Zeek (Bro) Intrusion Detection</surname>
          </string-name>
          <string-name>
            <surname>Series</surname>
          </string-name>
          , Lab 1: Introduction to Zeek, University of South Carolina,
          <source>Technical Report</source>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Lucidchart</surname>
          </string-name>
          .
          <source>What the Waterfall Project Management Methodology Can Do for You</source>
          ,
          <year>2023</year>
          . URL: https://www.lucidchart.com/blog/waterfall-project-management.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Atlassian</surname>
          </string-name>
          .
          <article-title>Waterfall Methodology for Project Management</article-title>
          .
          <source>Atlassian Agile Coach</source>
          ,
          <year>2024</year>
          . URL: https://www.atlassian.com/agile/project-management/waterfall.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Atlassian. Minimum Viable</surname>
          </string-name>
          <article-title>Product (MVP): What is it</article-title>
          &amp; Why it Matters.
          <source>Atlassian Product Management</source>
          ,
          <year>2023</year>
          . URL: https://www.atlassian.com/agile/product-management/minimumviable-product.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Zeek</given-names>
            <surname>Documentation</surname>
          </string-name>
          .
          <source>Conn.log and Notice log (logs chapter)</source>
          ,
          <year>2025</year>
          . URL: https://docs.zeek.org.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gladka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kuchanskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kostikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lisnevskyi</surname>
          </string-name>
          .
          <article-title>Method of Allocation of Labor Resources for IT Project Based on Expert Assessements of Delphi</article-title>
          , in: SIST 2023
          <article-title>-</article-title>
          2023
          <source>IEEE International Conference on Smart Information Systems and Technologies, Proceedings</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>545</fpage>
          -
          <lpage>551</lpage>
          , doi:10.1109/SIST58284.
          <year>2023</year>
          .
          <volume>10223549</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>E.</given-names>
            <surname>Ries</surname>
          </string-name>
          .
          <source>Minimum Viable Product: a Guide</source>
          , in: Startup Lessons Learned,
          <year>2009</year>
          . URL: https://www.startuplessonslearned.com/
          <year>2009</year>
          /08/minimum-viable
          <article-title>-product-guide</article-title>
          .html.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>T.</given-names>
            <surname>Babenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kolesnikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lisnevskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Makilenov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Landovsky</surname>
          </string-name>
          . Definition of Cryptojacking Indicators,
          <source>in: CEUR Workshop Proceedings</source>
          ,
          <year>2024</year>
          ,
          <volume>3680</volume>
          . https://www.scopus.com/inward/record.uri?eid=
          <fpage>2</fpage>
          -
          <lpage>s2</lpage>
          .
          <fpage>0</fpage>
          -
          <lpage>85192508442</lpage>
          &amp;partnerID=
          <volume>40</volume>
          &amp;md5=
          <fpage>3dfe1914b48d27c693ac1db293ed15c5</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>T.</given-names>
            <surname>Babenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Amanzholova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lisnevskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Abylgazy</surname>
          </string-name>
          .
          <article-title>Cybersecurity-level assessment models</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          ,
          <year>2025</year>
          ,
          <volume>3966</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>N.</given-names>
            <surname>Maligazhdarova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.M.</given-names>
            <surname>Avinash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mukasheva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Yedilkhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Askhatuly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Berdyshev</surname>
          </string-name>
          .
          <article-title>A Comparative Study of Machine Learning and Large Language Models for SQL and NoSQL Injection Vulnerability Detection</article-title>
          ,
          <source>in: 2025 IEEE 5th International Conference on Smart Information Systems and Technologies (SIST)</source>
          ,
          <year>2025</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>