Network Architecture

Network Architecture

Next-Generation Yacht Cybersecurity Architecture: Technical Description

Concept Overview

The diagram illustrates an advanced cybersecurity architecture for a superyacht, built on the principles of Defense-in-Depth and Zero Trust. The solution is designed for secure convergence (integration) of guest and crew IT services with critical operational technologies (OT/GOT) used for vessel control.

The architecture leverages innovative technologies such as “Wi-Fi Morphing” and the “Quantum Core” security processing engine, as well as a multi-layer AI-driven monitoring system to counter the most modern threats.

Below is a detailed description of the protection layers and diagram components.

1. External Perimeter and Multimodal Connectivity

The first line of defense, providing flexible and secure vessel connectivity to global networks.

  • Connectivity Sources: Channel aggregation to ensure connectivity anywhere in the world:
    • Satellite VSAT: Traditional reliable connectivity via geostationary satellites.
    • Starlink/LEO: High-speed, low-latency connectivity via low-Earth-orbit constellations.
    • 4G/5G Modem: Cellular connectivity in coastal areas.
  • Perimeter Firewall (Firewall) NOFW >1: A high-performance border security gateway in a high-availability configuration (>1). Performs primary traffic filtering at the “vessel–shore” boundary and terminates VPN tunnels.
  • Advanced Threat Defense: A cloud or on-prem “sandbox” service for analyzing suspicious files for zero-day threats before they enter the network.

2. Protected Network Core and Services (Core Network & Server Farm)

The central node for data processing and enforcement of security policies.

  • Core Firewall (FW Core) NOFW k2 "Quantum Core": The heart of the security system. A resilient internal firewall cluster (k2 configuration). The "Quantum Core" technology provides ultra-high performance deep packet inspection (DPI) and is ready for future adoption of post-quantum encryption algorithms.
  • Wi-Fi Morphing Controller (Controller WIFI Morphing): An innovative wireless network management system. Uses Moving Target Defense by dynamically changing network parameters (BSSID, SSID, keys), making the Wi-Fi network “invisible” and resistant to scanning and “evil twin” attacks.
  • VLANOMZ: A specialized isolated management zone for infrastructure servers, with strictly limited access from the external network (WAN).

3. Active Monitoring and AI Analytics (Overlay Security)

A security overlay for proactive real-time threat detection without interfering with system operations.

  • IDS/ISM OT Monitoring: A comprehensive intrusion detection system adapted to the maritime context (ISM - International Safety Management).
    • OT Cyber Sensor: Passive sensors connected to industrial networks that analyze specialized maritime protocols for anomalous commands.
  • AI Anomaly Detection: An AI-based system that analyzes behavioral patterns in the network to identify hidden threats that traditional signature-based methods cannot detect.

4. Strategic Segmentation (Segmentation Shield)

The visualized “Segmentation Shield” demonstrates strict separation of the network into isolated zones with different trust levels.

  • GREEN ZONE:
    • Hospitality & Entertainment: An isolated segment for guests (Smart Home, Apple TV, personal devices) with Internet-only access via Captive Portal / Wi-Fi Controller.
    • CREW: Segments for administrative tasks (Accounting, Concierge services) and crew personal access (VLAN Crew on request).
  • YELLOW ZONE CREW: A working environment for service IT servers and IP telephony.
  • VLAN SecureCom: A dedicated segment for encrypted confidential communications terminals.

5. Critical Infrastructure Protection (RED ZONE)

The “Red Zone” is a zero-trust segment hosting the vessel’s life-critical systems.

  • Navigation & GOT (Navigation & GOT): Includes bridge systems (Bridge NAV Systems), engine control, and other operational technologies (Engine & GOT).
  • Industrial Firewall or Data Diode (Industrial Firewall or Data Diode): A mission-critical barrier providing one-way data flow. It allows telemetry to be transmitted from the isolated OT segment to monitoring systems, while physically blocking any inbound connections or attacks into the red zone.

Glossary: Terms and Acronyms

To ensure unambiguous understanding of the advanced technologies used in this architecture, the following definitions are provided:

Term / Acronym Description
AI Anomaly Detection AI Anomaly Detection. An artificial intelligence / machine learning system that identifies threats not by known-virus databases, but by deviations from normal network and user behavior.
Captive Portal An authentication web page a user sees before gaining access to a public Wi-Fi network (e.g., in the guest zone).
Data Diode Data Diode. A hardware cybersecurity device that physically guarantees one-way data transfer (from the protected segment outward), eliminating inbound attacks.
GOT Generic Operational Technology. An umbrella term for onboard control and automation systems (engines, power, HVAC, etc.) that are critical to yacht operations.
IDS/ISM Intrusion Detection System / International Safety Management. An intrusion detection system integrated with the vessel’s safety management processes.
LEO / НОО Low Earth Orbit. Satellite systems such as Starlink that provide high speed and low latency.
NOFW (>1 / k2) Internal notation for high-availability and high-performance Network Firewall cluster configurations.
OT Cyber Sensor OT Cyber Sensor. A specialized device for passive monitoring of industrial (OT) networks without impacting technological processes.
Quantum Core Quantum Core. A marketing name for a high-performance core firewall processing module designed to handle large data volumes and support future encryption methods.
Segmentation Shield Segmentation Shield. A visual representation of deep logical isolation between network zones to prevent threat propagation.
VLANOMZ VLAN Operations Management Zone. An isolated virtual network for infrastructure management, with access strictly limited from external networks (WAN).
VSAT Very Small Aperture Terminal. Traditional satellite communications via geostationary satellites, providing global coverage.
WIFI Морфинг WiFi Morphing. A Moving Target Defense technique for wireless networks. The controller continuously changes network parameters (BSSID, keys, etc.) to prevent reconnaissance and Wi-Fi attacks.
FW Firewall.
Functional Concept

Block diagram of yacht systems logic

1. External layer: Connectivity and Data Ingress (WAN)

BLOCK: External connectivity channels (WAN Sources)

  • Components: Satellite VSAT, Starlink/HOO, 4G/5G modems.
  • Function: Provides global connectivity and Internet access.
  • Flow: Entry point for all data.
↓ (Raw traffic)

2. Security perimeter and Access Control

BLOCK: Perimeter protection

  • Components: Perimeter firewall (Perimeter FW), Advanced Threat Protection.
  • Function: “Allow/deny” traffic filtering, blocking external attacks.

BLOCK: Special access (VLAN OMZ)

  • Components: VLAN OMZ (Operations Management Zone).
  • Function: A restricted-access zone reachable from the WAN. Used for remote administration or technical support.
  • Note: An isolated channel that does not mix with guest or general traffic.
↓ (Sanitized traffic)

3. Core layer: Network intelligence

BLOCK: Network core and server farm

  • Components: Quantum Core, Core Firewall (FW Core), Morphing Wi-Fi Controller.
  • Function: Traffic routing, seamless roaming management (Wi-Fi), resource allocation.

BLOCK: Global security monitoring (IDS/ISM OT Monitoring)

  • Components: AI anomaly detector, cyber sensors, monitoring dashboards.
  • Function: The security “brain.” Receives data (logs/alerts) from the perimeter and from the isolated OT segment (via a data diode) to analyze the vessel’s status in real time.

4. Internal segmentation: User and Service zones

STREAM A: Guests and Entertainment (Green zone)

Ingress control: Captive Portal / Wi-Fi Controller (user authentication).

  • BLOCK: Hospitality and Entertainment
    • Systems: Guest access node, Smart Home, Apple TV / iPad.
    • Status: Fully isolated from vessel control systems. Internet only.

STREAM B: Crew and Administration (Green/Yellow zones)

  • BLOCK: Crew Services (Green Zone > Crew)
    • Systems: Concierge service management, Accounting.
    • Systems: Onboard IT Servers (On request) — servers available by request only.
  • BLOCK: Crew Operations (Yellow Zone)
    • Systems: IP telephony, shared crew servers.
  • BLOCK: VLAN SecureCom
    • Systems: Encrypted communications terminals (confidential discussions).

5. Critical infrastructure: OT and Safety (Red zone)

STREAM C: “Red” zone (maximum protection)

Critical barrier: Industrial firewall or Data Diode.
Principle: One-way data flow. Information may exit for monitoring, but nothing from outside can enter.

BLOCK: Navigation and Control (Red Zone)

  • Systems: Bridge hub systems (Bridge HUB Systems), Engine and GOT systems.
  • Status: Full isolation.

BLOCK: Life-Safety Systems (Safety & Alert System Zone)

  • Systems: Public Address system (PA), Fire suppression and smoke extraction, Emergency lighting and alarms.
  • Function: Autonomous vessel physical safety systems.
Scheme (Hover to view)
Network Architecture
Drag to resize ×