{"id":4942,"date":"2026-05-06T09:08:49","date_gmt":"2026-05-06T07:08:49","guid":{"rendered":"https:\/\/cybernemo.eu\/?p=4942"},"modified":"2026-04-28T09:09:56","modified_gmt":"2026-04-28T07:09:56","slug":"from-nemo-to-cybernemo-the-evolution-of-network-monitoring","status":"publish","type":"post","link":"https:\/\/cybernemo.eu\/index.php\/2026\/05\/06\/from-nemo-to-cybernemo-the-evolution-of-network-monitoring\/","title":{"rendered":"From NEMO to CyberNEMO: The Evolution of Network Monitoring"},"content":{"rendered":"\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The transition from the NEMO project to <strong>CyberNEMO<\/strong> marks a critical evolution in how we approach network visibility within distributed systems. In the original NEMO project, the primary challenge was establishing reliable performance monitoring across diverse infrastructure. Our response, developed by <strong>UPM<\/strong> within the networking work package, was <strong>White Shark<\/strong>. White Shark was designed as a network probe, focusing on the fundamental <strong>socket<\/strong> layer to measure point-to-point communication metrics like latency, throughput, and jitter. This provided a foundational level of observability, allowing operators to understand <em>how<\/em> the network was performing at any given moment.<\/p>\n\n\n\n<p>However, as we moved into CyberNEMO, the landscape shifted dramatically. The emergence of a true &#8220;computing continuum&#8221;\u2014spanning Cloud, Edge, and IoT devices\u2014introduced complexity and a expanded attack surface. Simple performance monitoring was no longer sufficient. We realized that the massive stream of high-fidelity network telemetry generated by White Shark was not just performance data; it was a rich, untapped source of security intelligence. The data that previously told us <em>if<\/em> the network was fast, could now tell us <em>if<\/em> the network was being compromised.<\/p>\n\n\n\n<p>This realization led to the development of the <strong>NADA<\/strong> (Network Anomaly Detection AI) component in CyberNEMO. NADA represents the intelligent brain that sits atop the White Shark sensing layer. Its purpose is to ingest the granular, socket-level data captured by the probe and use advanced machine learning algorithms to identify <strong>temporal and contextual anomalies<\/strong>.<\/p>\n\n\n\n<p>The journey from NEMO to CyberNEMO is therefore characterized by a shift from reactive performance observation to proactive, AI-driven security validation. By enriching the data previously used only for network optimization, we have created a robust mechanism for enforcing <strong>Zero Trust<\/strong> principles by design. This evolutionary step ensures that CyberNEMO doesn&#8217;t just provide a high-performance network, but a verifiably secure and resilient foundation for the next generation of meta-operating systems.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The transition from the NEMO project to CyberNEMO marks a critical evolution in how we approach network visibility within distributed systems. In the original NEMO project, the primary challenge was establishing reliable performance monitoring across diverse infrastructure. Our response, developed &hellip;<\/p>\n","protected":false},"author":4,"featured_media":4943,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"_mi_skip_tracking":false,"footnotes":""},"categories":[17],"tags":[],"cc_featured_image_caption":{"caption_text":"","source_text":"","source_url":""},"_links":{"self":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts\/4942"}],"collection":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/comments?post=4942"}],"version-history":[{"count":1,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts\/4942\/revisions"}],"predecessor-version":[{"id":4944,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts\/4942\/revisions\/4944"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/media\/4943"}],"wp:attachment":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/media?parent=4942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/categories?post=4942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/tags?post=4942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}