Let’s Talk: Categorizing the Types of Network Baselining

Understanding Network Baselining in OT Security

As security needs related to Operational Technology (OT) evolve, so do the complexities and importance of securing these environments. Network baselining plays a crucial role in identifying and mitigating security threats by establishing expected network behavior and detecting anomalies. By monitoring behavior that deviates from an established baseline, security teams can identify potentially malicious activities without relying solely on signature-based detections.

Despite its significance, network baselining is often a poorly defined term. Different interpretations can impact how it is communicated and applied, making it essential to clarify its meaning and categorization.

The Core Concept of Network Baselining

At its simplest, network baselining refers to defining normal network traffic patterns within an environment. However, the definition varies depending on the level of detail included in the baseline. Some may consider a baseline as merely a record of IP-to-IP communication, while others might incorporate additional factors like ports, protocols, device types, and service-specific behaviors.

To bring clarity, we categorize network baselining into three primary types:

1. Overview Baselining

This type of baselining corresponds with very basic information, such as IPs, ports, and/or protocols involved in a communication, or at the overall throughput of communications occurring between devices.  

This foundational type of baselining includes basic information such as:

  • IP addresses involved in communication

  • Ports and protocols used

  • Overall network throughput between devices

2. Positive-Space Pattern-Based Baselining

This type of baselining generally is looking at more specific information, such as the specific patterns of traffic expected between a given pair of device types or other service-specific traffic patterns that are expected within an environment. 

This approach goes beyond surface-level data and focuses on expected traffic patterns, such as:

  • Specific communication behaviors between known device types

  • Recognized service-specific traffic flows

  • Established transaction patterns within the network

3. Negative-Space Pattern-Based Baselining

This type of baselining is the opposite of its twin – it is looking for patterns and behaviors that strictly should never occur within an environment, such as unrelated subnets communicating to one another or connections between device types that should not occur.  

This method focuses on identifying traffic that should never occur, such as:

  • Communication between unrelated subnets

  • Unauthorized device-to-device interactions

  • Traffic originating from unusual or unapproved sources

Customizing Network Baselines

Each of these baseline types can be refined using additional modifiers, including:

  • Filtering by specific communication protocols

  • Isolating baselines to particular network segments

  • Defining granular baselines for individual use cases

From Network Baselining to Detection

Once a baseline is established, the next step is leveraging it for threat detection. Network baselining allows security teams to identify deviations from expected behavior and categorize detections accordingly:

1. Statistical Detections (Tied to Overview Baselining)

These types of detections tend to calculate statistics related to traffic volume/size and amount of communications of a specific type. Spikes in these numbers can correspond to C2 traffic, exfiltration, or even potentially a firmware upload. 

These detections rely on traffic volume and communication frequency analysis. Abnormal spikes may indicate:

  • Command-and-Control (C2) communication

  • Data exfiltration attempts

  • Firmware uploads or unauthorized file transfers

2. Pattern-Based Detections (Tied to Positive-Space Baselining)

Detections in this category tend to correspond with looking for patterns related to malicious activity such as port scanning or traffic matching the pattern of DDoS traffic or even application-specific protocol detections that relate to issues such as UMAS protocol exploitation in modbus. 

Pattern-based detections focus on recognizing malicious activity trends, such as:

  • Port scanning attempts

  • Distributed Denial-of-Service (DDoS) patterns

  • Exploitation of application-specific protocols (e.g., UMAS in Modbus)

3. Deviation Detections (Tied to Negative-Space Baselining)

Deviation detections tend to look for those things that should specifically never occur in an environment and flag them if they do occur. Examples of this include communications going to an unauthorized port on a device, or devices in different segments of a network communicating when they should not.

Deviation detections can also address general inconsistencies in typical behavior, such as a new IP pair beginning communication for the first time in an environment that is otherwise static. 

These detections highlight anomalies that should never occur, including:

  • Communication attempts on unauthorized ports

  • Unexpected cross-segment device communication

  • New IP pairs communicating in a static environment

By mapping these detection categories to their respective baseline types, organizations can create a structured and effective network baselining strategy.

Implementing an Effective Network Baselining Strategy

Identifying the need for network baselining is only the first step. To transition from concept to implementation, follow these key steps:

  1. Assess Available Resources

    • What tools do you currently have?

    • What data is already being collected?

    • What expertise is available in your team?

  2. Align Resources with Goals

    • Determine how your existing tools and data support the end goal

    • Identify gaps and potential solutions

  3. Develop an Action Plan

    • Set clear objectives for each baselining type

    • Implement monitoring and detection rules based on identified baselines

    • Regularly refine and update baselines to adapt to evolving threats

Conclusion

Network baselining is a powerful technique for improving OT security by understanding normal network behavior and identifying anomalies. By categorizing baselines into Overview, Positive-Space, and Negative-Space types, security teams can systematically detect and mitigate threats. Aligning these baselines with statistical, pattern-based, and deviation detections enhances threat visibility and response effectiveness.

As organizations continue to refine their security postures, implementing a structured network baselining strategy will be essential for proactive defense against evolving cyber threats.

FAQs

1. Why is network baselining important for OT security?
Network baselining helps identify deviations from normal behavior, allowing security teams to detect anomalies and potential threats before they cause damage.

2. How often should network baselines be updated?
Baselines should be reviewed and updated regularly to adapt to network changes, new devices, and emerging threats.

3. Can network baselining replace traditional security measures?
No, it should be used alongside signature-based detection, firewall rules, and other security controls for a comprehensive defense strategy.

4. What challenges come with implementing network baselining?
Common challenges include defining accurate baselines, managing false positives, and ensuring continuous monitoring for evolving threats.

5. How does network baselining help with compliance?
By providing visibility into normal and abnormal network behavior, baselining supports compliance with industry regulations and standards, such as NIST and IEC 62443.

See how Insane Cyber transforms security

Our products are designed to work with
you and keep your network protected.