NDR

Introduction

Network Detection and Response (NDR) is a cybersecurity technology that continuously analyses network traffic to detect anomalies, attacks, lateral movement and suspicious communication patterns. NDR solutions combine network monitoring, behavioural analysis, protocol inspection and threat detection to provide insight into activities that traditional security measures may miss.

In industrial environments, NDR plays an increasingly important role due to growing IT OT Convergence, the rise of Industrial Internet of Things, remote access, cloud connectivity and advanced threats against ICS and OT networks.

Unlike classic network monitoring, NDR does not focus solely on availability or performance, but specifically on security behaviour within network communication. The goal is to detect:

  • Lateral movement
  • Unusual communication
  • Malware activity
  • Command-and-control traffic
  • Protocol abuse
  • Insider threats
  • Unauthorised access
  • Data exfiltration

Within OT environments, NDR is often combined with Passive Monitoring, SIEM, SOC and Threat Intelligence.


⚙️ How NDR works

An NDR platform analyses network traffic from several sources:

Source Example
SPAN ports Mirrored switch traffic
TAPs Passive network captures
NetFlow/IPFIX Flow-based metadata
Packet capture Full packet inspection
Cloud traffic Virtual networks
OT protocols Industrial protocol analysis

Most NDR platforms operate passively so that operational systems are not affected.

The analysis process typically consists of:

  1. Collecting network data
  2. Protocol decoding
  3. Building behavioural baselines
  4. Detecting anomalies
  5. Correlating with threat intelligence
  6. Incident analysis and response

Modern solutions often use:

  • Machine Learning
  • Behavioural analysis
  • Statistical anomaly detection
  • Rule-based detection
  • Signature matching
  • AI-based classification

🌐 Difference between NDR and traditional network monitoring

Traditional network monitoring focuses primarily on availability and performance.

NDR specifically focuses on security analysis.

Functionality Traditional monitoring NDR
Availability monitoring Yes Limited
Performance analysis Yes Limited
Security detection Limited Extensive
Behavioural analysis No Yes
Threat hunting No Yes
Anomaly detection Limited High
Protocol inspection Basic In-depth
Lateral movement detection No Yes

NDR functionally sits between:


🏭 NDR in OT environments

Within industrial networks, NDR requires specific characteristics due to:

  • Deterministic network behaviour
  • Legacy protocols
  • High availability requirements
  • Limited patching options
  • Long asset lifecycles
  • Proprietary communication

OT-specific NDR platforms support industrial protocols such as:

This enables OT-oriented detections such as:

Detection Example
PLC logic changes New download to controller
Rogue engineering station Unknown laptop in OT
Protocol abuse Unexpected write commands
Firmware changes New PLC firmware
Lateral movement IT system communicating with PLC
External access Vendor remote access outside maintenance window
Scanning Active port scan in OT

OT NDR strongly focuses on contextual analysis of industrial processes.


🔍 Behavioural analysis and baselining

A key function of NDR is building normal network behaviour patterns.

Examples of baselines:

  • Which systems normally communicate with each other
  • Which protocols are used
  • Which ports are active
  • Which communication volumes are normal
  • Which time windows are typical

Deviations from these can indicate:

  • Malware
  • Misconfigurations
  • Insider threats
  • Lateral movement
  • Shadow IT/OT
  • Compromised systems

In OT environments, this often works well because industrial communication is relatively predictable.

For example:

  • A PLC normally only communicates with SCADA
  • An HMI does not send DNS requests to the internet
  • A historian does not establish SMB connections to engineering stations

When such anomalies occur, NDR can generate alarms.


🛡️ Detection of lateral movement

One of the main benefits of NDR is detection of lateral movement within networks.

After initial compromise, attackers often move through the network via:

Traditional endpoint solutions sometimes miss this network context.

NDR can detect:

  • New communication paths
  • Unusual authentication
  • Traffic between normally segregated zones
  • Credential misuse
  • Network scans
  • Increased protocol activity

Within OT networks, lateral movement is particularly risky because a single compromised engineering station can affect multiple production lines.


⚡ Deep Packet Inspection within NDR

Many NDR platforms use DPI to analyse protocols in depth.

DPI provides insight into:

  • Function codes within Modbus TCP
  • PLC commands
  • Firmware transfers
  • Configuration changes
  • File exchange
  • Unusual protocol fields

This enables advanced detections.

Example:

A standard firewall only sees TCP traffic on port 502.

An NDR platform sees:

  • Which Modbus function code is used
  • Whether registers are being read or written
  • Which devices are involved
  • Whether anomalous behaviour is occurring

This is crucial for OT security.


🔐 Integration with SOC and SIEM

NDR solutions are often integrated with:

The workflow typically looks like this:

  1. NDR detects anomalous network behaviour
  2. The event is forwarded to SIEM
  3. Correlation with other security events
  4. Incident analysis by SOC
  5. Automated response via SOAR

In converged IT/OT environments, this creates a single central security view.


🧠 Machine learning within NDR

Many modern NDR platforms use Machine Learning for:

  • Baseline analysis
  • Behavioural clustering
  • Detection of unknown threats
  • Alert prioritisation
  • Risk scores

Benefits:

  • Detection of zero-day behaviour
  • Less dependency on signatures
  • Recognition of subtle anomalies

Limitations:

  • Risk of false positives
  • Long learning period
  • Complexity of OT processes
  • Need for context validation

Within OT, human validation remains essential due to operational impact.


⚠️ Challenges in OT NDR

Although NDR is powerful, important considerations exist.

Legacy protocols

Many industrial protocols contain:

  • No encryption
  • No authentication
  • Little metadata
  • Vendor-specific extensions

This complicates detection and interpretation.

Encrypted traffic

Increasingly more traffic uses TLS or encryption.

This makes DPI harder unless:

  • Metadata analysis is used
  • SSL inspection is possible
  • Endpoint telemetry is available

Operational sensitivity

OT networks are sensitive to:

  • Additional latency
  • Broadcast storms
  • Excessive monitoring
  • Packet loss

NDR solutions are therefore almost always implemented passively.

False positives

During unusual maintenance work, legitimate activities can trigger alarms.

For example:

  • Firmware updates
  • Engineering uploads
  • Vendor remote maintenance
  • Temporary bypasses

Good tuning is therefore essential.


🏗️ NDR within Zero Trust and Defense in Depth

NDR supports modern security architectures such as:

NDR provides visibility at the network layer.

Examples:

Security concept NDR role
Zero Trust Verifying communication behaviour
Segmentation Detecting unwanted connections
Threat Hunting Analysis of suspicious flows
Incident Response Forensic network data
Risk Management Identifying high-risk assets

⚙️ Practical example: water treatment plant

A water company implements NDR within an OT network with:

Situation

An engineering laptop is infected via phishing in the IT network.

Detection

The NDR platform detects:

  • New communication towards PLCs
  • Anomalous Modbus write commands
  • Lateral movement to OT zones
  • Unusual network paths

Response

The SOC:

  • Blocks network access
  • Segments affected systems
  • Analyses packet captures
  • Verifies PLC integrity

This prevents process disruption.


🔄 Difference between NDR, IDS and IPS

Property IDS IPS NDR
Detection Yes Yes Yes
Blocking No Yes Sometimes
Behavioural analysis Limited Limited Extensive
Machine Learning Limited Limited Often
Historical analysis Limited Limited Extensive
OT context Variable Variable High
Threat hunting No No Yes

NDR is therefore broader than classic detection systems.


📈 The future of NDR within OT

As digitalisation continues, the importance of NDR is growing within:

Key trends:

NDR is increasingly becoming a core component of modern OT security architectures.