The Bro Network Security Monitor
|
|
|
- David Gray
- 10 years ago
- Views:
Transcription
1 Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory
2 What is Bro? 2
3 What is Bro? Packet Capture 2
4 What is Bro? Packet Capture Traffic Inspection 2
5 What is Bro? Packet Capture Traffic Inspection Attack Detection 2
6 What is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow syslog Log Recording 2
7 What is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow syslog Log Recording Flexibility Abstraction Data Structures 2
8 What is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow syslog Log Recording Flexibility Abstraction Data Structures 2
9 What is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow syslog Log Recording Flexibility Abstraction Data Structures 2
10 What is Bro? Packet Capture Traffic Inspection Attack Detection Domain-specific Python NetFlow syslog Log Recording Flexibility Abstraction Data Structures 2
11 Philosophy Fundamentally different from other IDS. Need to reset your idea of an IDS before starting to use Bro. Real-time network analysis framework. Primarily an IDS, but many use it for general traffic analysis. Can accommodate a range of detection approaches. Policy-neutral at the core. Highly stateful. Tracks extensive application-layer network state. Supports forensics. Extensively logs what it sees. 3
12 Bro History Vern writes 1st line of code 4
13 Bro History Vern writes 1st line of code LBNL starts using Bro operationally v0.2 1st CHANGES entry v0.4 HTTP analysis Scan detector IP fragments Linux support v0.6 RegExps Login analysis v0.7a90 Profiling State Mgmt v0.7a175/0.8ax Signatures SMTP IPv6 support User manual v0.8ax/0.9ax SSL/SMB STABLE releases BroLite v1.1/v1.2 when Stmt Resource tuning Broccoli DPD v1.0 BinPAC IRC/RPC analyzers 64-bit support Sane version numbers v1.5 BroControl v1.4 DHCP/BitTorrent HTTP entities NetFlow Bro Lite Deprecated Bro SDCI Bro 2.0 New Scripts Bro 2.1 IPv6 Input Framework v0.7a48 Consistent CHANGES 0.8a37 Communication Persistence Namespaces Log Rotation v1.3 Ctor expressions GeoIP Conn Compressor 4
14 Bro History Host Context Time Machine Enterprise Traffic TRW State Mgmt. Independ. State Bro Cluster Shunt Academic Publications USENIX Paper Stepping Stone Detector Anonymizer Active Mapping Context Signat. BinPAC DPD 2nd Path Parallel Prototype Autotuning Input Framework Vern writes 1st line of code LBNL starts using Bro operationally v0.2 1st CHANGES entry v0.4 HTTP analysis Scan detector IP fragments Linux support v0.6 RegExps Login analysis v0.7a90 Profiling State Mgmt v0.7a175/0.8ax Signatures SMTP IPv6 support User manual v0.8ax/0.9ax SSL/SMB STABLE releases BroLite v1.1/v1.2 when Stmt Resource tuning Broccoli DPD v1.0 BinPAC IRC/RPC analyzers 64-bit support Sane version numbers v1.5 BroControl v1.4 DHCP/BitTorrent HTTP entities NetFlow Bro Lite Deprecated Bro SDCI Bro 2.0 New Scripts Bro 2.1 IPv6 Input Framework v0.7a48 Consistent CHANGES 0.8a37 Communication Persistence Namespaces Log Rotation v1.3 Ctor expressions GeoIP Conn Compressor 4
15 Who s Using It? Installations across the US Universities Research Labs Supercomputer Centers Industry Examples Lawrence Berkeley National Lab Indiana University National Center for Supercomputing Applications National Center for Atmospheric Research... and many more sites Fully integrated into Security Onion Popular security-oriented Linux distribution Recent User Meetings Bro Workshop 2011 at NCSA Bro Exchange 2012 at NCAR Each attended by about 50 operators from from organizations 5
16 Deployment Internet Internal Network 6
17 Deployment Internet Tap Internal Network Bro 6
18 Deployment Internet Tap Internal Network Bro Runs on commodity platforms.! Standard PCs & NICs. Supports FreeBSD/Linux/OS X. 6
19 Example Logs 7
20 Example Logs > bro -i en0 [... wait...] > cat conn.log 7
21 Example Logs > bro -i en0 [... wait...] > cat conn.log #fields ts id.orig_h id.orig_p id.resp_h id.resp_p proto service duration tcp http tcp http tcp http tcp http tcp http tcp http tcp http
22 Example Logs > bro -i en0 [... wait...] > cat conn.log #fields ts id.orig_h id.orig_p id.resp_h id.resp_p proto service duration tcp http tcp http tcp http tcp http tcp http tcp http tcp http > cat http.log 7
23 Example Logs > bro -i en0 [... wait...] > cat conn.log #fields ts id.orig_h id.orig_p id.resp_h id.resp_p proto service duration tcp http tcp http tcp http tcp http tcp http tcp http tcp http > cat http.log #fields ts id.orig_h id.orig_p [...] host uri status_code user_agent [...] docs.python.org /lib/lib.css 200 Mozilla/ docs.python.org /icons/previous.png 304 Mozilla/ docs.python.org /lib/lib.html 200 Mozilla/ docs.python.org /icons/up.png 304 Mozilla/ docs.python.org /icons/next.png 304 Mozilla/ docs.python.org /icons/contents.png 304 Mozilla/ docs.python.org /icons/modules.png 304 Mozilla/ docs.python.org /icons/index.png 304 Mozilla/ / 200 Mozilla/5.0 7
24 Example Logs > bro -i en0 [... wait...] > cat conn.log #fields ts id.orig_h id.orig_p id.resp_h id.resp_p proto service duration tcp http tcp http tcp http [...] host uri status_code 80 tcp user_agent http [...] docs.python.org /lib/lib.css tcp Mozilla/5.0 http tcp http docs.python.org /icons/previous.png tcp Mozilla/5.0 http docs.python.org /lib/lib.html 200 Mozilla/5.0 > cat docs.python.org http.log /icons/up.png 304 Mozilla/5.0 docs.python.org /icons/next.png 304 Mozilla/5.0 #fields ts id.orig_h id.orig_p [...] host uri status_code user_agent [...] docs.python.org /icons/contents.png docs.python.org /lib/lib.css Mozilla/5.0 Mozilla/ docs.python.org /icons/previous.png 304 docs.python.org /icons/modules.png 304 Mozilla/ docs.python.org /lib/lib.html 200 Mozilla/ docs.python.org /icons/index.png docs.python.org /icons/up.png Mozilla/ docs.python.org /icons/next.png 304 Mozilla/ / docs.python.org /icons/contents.png Mozilla/5.0 Mozilla/ docs.python.org /icons/modules.png 304 Mozilla/ docs.python.org /icons/index.png 304 Mozilla/ / 200 Mozilla/5.0 7
25 Identifying HTTP Servers 8
26 Identifying HTTP Servers Server Addresses a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com nuq04s07-in-f27.1e100.net a deploy.akamaitechnologies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com nuq04s06-in-f27.1e100.net upload-lb.pmtpa.wikimedia.org nuq04s08-in-f27.1e100.net 8
27 Identifying HTTP Servers Server Addresses HTTP Host Headers a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com nuq04s07-in-f27.1e100.net a deploy.akamaitechnologies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com nuq04s06-in-f27.1e100.net upload-lb.pmtpa.wikimedia.org nuq04s08-in-f27.1e100.net ad.doubleclick.net ad.yieldmanager.com b.scorecardresearch.com clients1.google.com googleads.g.doubleclick.net graphics8.nytimes.com l.yimg.com liveupdate.symantecliveupdate.com mt0.google.com pixel.quantserve.com platform.twitter.com profile.ak.fbcdn.net s0.2mdn.net safebrowsing-cache.google.com static.ak.fbcdn.net swcdn.apple.com upload.wikimedia.org
28 File Content 9
29 File Content GET /skins-1.5/common/images/magnify-clip.png image/png GET /skins-1.5/monobook/external.png image/png GET /softw/90/update/avg9infoavi.ctf text/plain GET /softw/90/update/avg9infowin.ctf text/plain GET /softw/90/update/u7avi1777u1705ff.bin application/x-dosexec 0210a9516dd34abc481683f877bd GET /softw/90/update/u7avi1778u1705z7.bin application/x-dosexec 9bd8e3a274d8ada852bc3d bf GET /softw/90/update/u7iavi2511u2510ff.bin application/x-dosexec 5e63f63fd a56dbd89d8688f GET /softw/90/update/u7iavi2512u2511z7.bin application/x-dosexec a8e1ef490967ef7eb6641bef9eed GET /softw/90/update/x8xplsb2_118c8.bin application/x-dosexec e c5550e9fbf33ef15fed75e5a GET /softw/90/update/x8xplsc_149d148c8.bin application/x-dosexec db5b04f3c45da4c0686c678bfd0e241c GET /sports/ text/html - 9
30 Software Logging 10
31 Software Logging Windows-Update-Agent - - Windows-Update-Agent Microsoft-IIS 6 0 Microsoft-IIS/ ASP.NET - - ASP.NET Microsoft-IIS 7 0 Microsoft-IIS/ ASP.NET - - ASP.NET SCSDK 6 0 SCSDK Apache 2 2 Apache/2.2.9 (Debian) PHP/ lenny PHP 5 2 PHP/ lenny Apache 2 2 Apache/2.2.9 (Debian) PHP/ lenny PHP 5 2 PHP/ lenny Apache 2 2 Apache/2.2.9 (Debian) PHP/ lenny PHP 5 2 PHP/ lenny Apache 2 2 Apache/2.2.9 (Debian) PHP/ lenny PHP 5 2 PHP/ lenny Apache 2 2 Apache/2.2.9 (Debian) PHP/ lenny PHP 5 2 PHP/ lenny Apache 2 0 Apache/ (Debian GNU/Linux) PHP 4 3 PHP/ Apache 2 2 Apache/2.2.9 (Debian) PHP/ lenny PHP 5 2 PHP/ lenny3 10
32 SSL Certificate Logging 11
33 SSL Certificate Logging CN=Microsoft Secure Server Authority,DC=redmond,DC=corp,DC=microsoft,DC=com CN=Sun Microsystems Inc SSL CA,OU=Class 3 MPKI Secure Server CA,OU=VeriSign CN=Microsoft Secure Server Authority,DC=redmond,DC=corp,DC=microsoft,DC=com CN=Microsoft Secure Server Authority,DC=redmond,DC=corp,DC=microsoft,DC=com CN=VeriSign Class 3 Extended Validation SSL CA,OU=Terms of use at CN=Akamai Subordinate CA 3,O=Akamai Technologies Inc,C=US CN=Akamai Subordinate CA 3,O=Akamai Technologies Inc,C=US OU=Equifax Secure Certificate Authority,O=Equifax,C=US CN=VeriSign Class 3 Secure Server CA,OU=Terms of use at CN=Akamai Subordinate CA 3,O=Akamai Technologies Inc,C=US CN=Network Solutions Certificate Authority,O=Network Solutions L.L.C.,C=US OU=Equifax Secure Certificate Authority,O=Equifax,C=US OU=Equifax Secure Certificate Authority,O=Equifax,C=US CN=Microsoft Secure Server Authority,DC=redmond,DC=corp,DC=microsoft,DC=com 11
34 Brownian 12
35 Architecture Packets Network 13
36 Architecture Events Protocol Decoding Event Engine Packets Network 13
37 Architecture Logs Notification Analysis Logic Policy Script Interpreter Events Protocol Decoding Event Engine Packets Network 13
38 Architecture Logs Notification User Interface Analysis Logic Policy Script Interpreter Events Protocol Decoding Event Engine Packets Network 13
39 Event Model Web Client Request for /index.html Web Server /4321 Status OK plus data /80 14
40 Event Model Web Client Request for /index.html Web Server /4321 Status OK plus data /80... Stream of TCP packets... SYN SYN ACK ACK ACK ACK FIN FIN 14
41 Event Model Web Client Request for /index.html Web Server /4321 Status OK plus data /80... Stream of TCP packets... SYN SYN ACK ACK ACK ACK FIN FIN Event connection_established( / /80) 14
42 Event Model Web Client Request for /index.html Web Server /4321 Status OK plus data /80... Stream of TCP packets... SYN SYN ACK ACK ACK ACK FIN FIN Event connection_established( / /80) TCP stream reassembly for originator Event http_request( / /80, GET, /index.html ) 14
43 Event Model Web Client Request for /index.html Web Server /4321 Status OK plus data /80... Stream of TCP packets... SYN SYN ACK ACK ACK ACK FIN FIN Event connection_established( / /80) TCP stream reassembly for originator Event http_request( / /80, GET, /index.html ) TCP stream reassembly for responder Event http_reply( / /80, 200, OK, data) 14
44 Event Model Web Client Request for /index.html Web Server /4321 Status OK plus data /80... Stream of TCP packets... SYN SYN ACK ACK ACK ACK FIN FIN Event connection_established( / /80) TCP stream reassembly for originator Event http_request( / /80, GET, /index.html ) TCP stream reassembly for responder Event http_reply( / /80, 200, OK, data) Event connection_finished( /4321, /80) 14
45 Script Example: Matching URLs Task: Report all Web requests for files called passwd. 15
46 Script Example: Matching URLs Task: Report all Web requests for files called passwd. event http_request(c: connection, # Connection. method: string, # HTTP method. original_uri: string, # Requested URL. unescaped_uri: string, # Decoded URL. version: string) # HTTP version. { if ( method == "GET" && unescaped_uri == /.*passwd/ ) NOTICE(...); # Alarm. } 15
47 Script Example: Scan Detector Task: Count failed connection attempts per source address. 16
48 Script Example: Scan Detector Task: Count failed connection attempts per source address. global attempts: table[addr] of count &default=0; event connection_rejected(c: connection) { local source = c$id$orig_h; # Get source address. local n = ++attempts[source]; # Increase counter. if ( n == SOME_THRESHOLD ) # Check for threshold. NOTICE(...); # Alarm. } 16
49 Distributed Scripts 17
50 Distributed Scripts Bro comes with >10,000 lines of script code. Prewritten functionality that s just loaded. Scripts generate all the logs. Amendable to extensive customization and extension. 17
51 Bro Ecosystem Internet Tap Internal Network Bro 18
52 Bro Ecosystem Internet Tap Internal Network Bro Control Output BroControl User Interface 18
53 Bro Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Control Output BroControl User Interface 18
54 Bro Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output BroControl User Interface 18
55 Bro Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output BroControl User Interface Events Bro Client Communication Library Broccoli 18
56 Bro Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output BroControl User Interface Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby (Broccoli Perl) 18
57 Bro Ecosystem Time Machine Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output BroControl User Interface Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby (Broccoli Perl) 18
58 Bro Ecosystem Time Machine Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output bro-aux BinPAC capstats BroControl Events Bro Client Communication Library Broccoli Python BTest tracesummary Broccoli Broccoli Ruby User Interface (Broccoli Perl) 18
59 Bro Ecosystem Time Machine Bro Distribution bro-2.1.tar.gz Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output bro-aux BTest BinPAC tracesummary capstats BroControl Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) 18
60 Bro Ecosystem Time Machine Bro Distribution bro-2.1.tar.gz Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output bro-aux BTest BinPAC tracesummary capstats BroControl Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) git://git.bro-ids.org 18
61 Bro Cluster Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Events State External Bro Control Output bro-aux BinPAC capstats BroControl Events Bro Client Communication Library Broccoli Python BTest tracesummary Broccoli Broccoli Ruby User Interface (Broccoli Perl) 19
62 Bro Cluster Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Events State External Bro Control Output bro-aux BinPAC capstats BroControl Events Bro Client Communication Library Broccoli Python BTest tracesummary Broccoli Broccoli Ruby User Interface (Broccoli Perl) 19
63 Bro Cluster Ecosystem Internet Tap Load- Balancer Internal Network Contributed Scripts Functionality Bro Events State External Bro Control Output bro-aux BinPAC capstats BroControl Events Bro Client Communication Library Broccoli Python BTest tracesummary Broccoli Broccoli Ruby User Interface (Broccoli Perl) 19
64 Bro Cluster Ecosystem Internet Tap Internal Network Packets Load- Balancer Contributed Scripts Functionality Bro Bro Bro Bro Bro Events State External Bro Control Output bro-aux BTest BinPAC tracesummary capstats BroControl Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) 19
65 Bro Cluster Ecosystem Internet Tap Internal Network Packets Load- Balancer Contributed Scripts Functionality Bro Bro Bro Bro Bro Events State External Bro bro-aux BTest BinPAC tracesummary capstats Control Control Output BroControl Output Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) 19
66 Bro Cluster Ecosystem Internet Tap Internal Network Packets Load- Balancer Frontend Contributed Scripts Functionality Bro Bro Bro Bro Bro Workers Events State External Bro bro-aux BTest BinPAC tracesummary capstats Control Control Output Manager BroControl Output Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) 19
67 A Production Load-Balancer cflow: 10GE line-rate, stand-alone load-balancer 10 Gb/s in/out Web & CLI Filtering capabilities Available from cpacket 20
68 A Production Load-Balancer cflow: 10GE line-rate, stand-alone load-balancer 10 Gb/s in/out Web & CLI Filtering capabilities Available from cpacket 20
69 Indiana University Indiana University OpenFlow Deployment v.1.0 Bloomington CIC Chicago Chicago Testlab 2 Nodes 10 Gig via 10 Gig via DWDM System via 8 OpenFlow Switches Test Servers 2 Nodes 5 Nodes Indianapolis ICTC Testpoint 2 Nodes IU Production Deployment IU Wireless SSID: OpenFlow Layer 3 router on OpenFlow switches InterOp lab Workshop Lindley Hall Telcom Bldn Informatics East Informatics West Monitoring Indianapolis VM Server 4 OpenFlow switches IU Core Network 6 x 10G 12 x 10G OpenFlow load balancer IDS Cluster 12 servers Source: Indiana University 21
70 Indiana University Indiana University OpenFlow Deployment v.1.0 Bloomington CIC Chicago Chicago Testlab 2 Nodes 10 Gig via 10 Gig via DWDM System via 8 OpenFlow Switches Test Servers 2 Nodes 5 Nodes Indianapolis ICTC Testpoint 2 Nodes IU Production Deployment IU Wireless SSID: OpenFlow Layer 3 router on OpenFlow switches InterOp lab Workshop Lindley Hall Telcom Bldn Informatics East Informatics West Monitoring Indianapolis VM Server 4 OpenFlow switches IU Core Network 6 x 10G 12 x 10G OpenFlow load balancer IDS Cluster 12 servers Source: Indiana University 21
71 External Events: Broccoli 22
72 External Events: Broccoli Auditing SSHD 22
73 External Events: Broccoli Solu5on&Overview& Auditing SSHD PARENT' SSHD' CHILD' SSHD' STUNNEL' SSLOGMUX' BROPIPE' Source: Scott Campbell / NERSC 5& 22
74 NERSC reserves the right to remove any data at any time and/or transfer data to NERSC Computer Use Policies Form other individuals working on the same or similar project once a user account is deleted or a person no longer has a business association with NERSC. Account Usage Users are not allowed to share their accounts with others. Monitoring and Privacy Users have no explicit or implicit expectation of privacy. NERSC retains the right to monitor the content of all activities on NERSC systems and networks and access any computer files without prior knowledge or consent of users, senders or recipients. NERSC may retain copies of any network traffic, computer files or messages indefinitely without prior knowledge or consent. NERSC personnel and users are required to address, safeguard against and report misuse, abuse and criminal activities. Misuse of NERSC resources can lead to temporary or permanent disabling of accounts, loss of DOE allocations, and administrative or legal actions. revision 1.1 date: 2007/October/11 20:06:56 23
75 ons for the Classroom The Security Fence Presented by NIEonline.com and the Association of American Editorial Cartoonists (AAEC) vs. y lines g civil me of as been n the ttacks the d peoe up otecttion ts in ction toon illustrates the problem of Cartoon Courtesy Clay Bennett / The Christian Science Monitor 24
76 Version 2.0 (Jan 2012) 25
77 Version 2.0 (Jan 2012) Default scripts rewritten from scratch. Focus on ease of use and operational deployment. New logging infrastructure. New build and packaging system. New auto-documentation system (Broxygen). Lots of bugs fixed. Obsolete code removed. New development infrastructure. New regression testing framework. New web server. New mailing lists. New logo. 25
78 Just released... 26
79 Just released... Bro 2.1 Comprehensive IPv6 support. Tunnel decapsulation. New logging formats (DataSeries / ElasticSearch) Input Framework 26
80 Input Framework Example: Blacklists IP Reason Timestamp Connected to honeypot Too many DNS requests Sent spam
81 User Interface 28
82 User Interface type Index: record { ip: addr; }; type Value: record { reason: string; timestamp: time; }; global blacklist: table[addr] of Value; Input::add_table(source="blacklist.tsv", idx=index, val=value, destination=blacklist); (Syntax simplified.) 28
83 User Interface type Index: record { ip: addr; }; type Value: record { reason: string; timestamp: time; }; global blacklist: table[addr] of Value; Input::add_table(source="blacklist.tsv", idx=index, val=value, destination=blacklist); (Syntax simplified.) event connection_established(c: connection) { if ( c$id$orig_h in blacklist ) alarm(...) } 28
84 Current Research 29
85 Performace: 100 Gb/s Now these sites need a monitoring solution... Working with cpacket on a 100GE loadbalancer! DOE/ESNet 100G Advanced Networking Initiative Source: ESNet Source: ESNet 30
86 Production Backbone in Planing 31
87 100 Gb/s Load-balancer
88 100 Gb/s Load-balancer 100Gbps cflow 100G 10Gb/s Bro Cluster
89 100 Gb/s Load-balancer 100Gbps cflow 100G API 10Gb/s Control Bro Cluster
90 Concurrent Analysis Logs Notification Analysis Logic Policy Script Interpreter Events Protocol Decoding Event Engine Packets Network 33
91 Concurrent Analysis Logs Notification Single Thread Analysis Logic Policy Script Interpreter Events Protocol Decoding Event Engine Packets Network 33
92 Architecture Notification Detection Logic Scripting Language Script Threads Events Packet Analysis Event Engine Event Engine Threads Packets Dispatcher Packet Dispatcher (NIC) Network 34
93 Architecture Notification Detection Logic Scripting Language Script Threads Events Packet Analysis Event Engine Event Engine Threads Cluster in a Box Packets Dispatcher Packet Dispatcher (NIC) Network 34
94 Architecture How to parallelize a scripting language? Notification Detection Logic Scripting Language Script Threads Events Packet Analysis Cluster in a Box Event Engine Packets Dispatcher Event Engine Threads Packet Dispatcher (NIC) Network 34
95 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue 35
96 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A http_request 35
97 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A http_request http_reply Conn A 35
98 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A http_request http_reply Conn A Conn B http_request 35
99 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A Conn A Conn B Orig X http_request http_reply http_request conn_rejected 35
100 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A Conn A Conn B Orig X Orig Y http_request http_reply http_request conn_rejected conn_rejected 35
101 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A Conn A Conn B Orig X Orig Y Orig X http_request http_reply http_request conn_rejected conn_rejected conn_rejected 35
102 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A Conn A Conn B Orig X Orig Y Orig X Conn B http_request http_reply http_request conn_rejected conn_rejected conn_rejected http_reply 35
103 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A Conn A Conn B Orig X Orig Y Orig X Conn B Conn A http_request http_reply http_request conn_rejected conn_rejected conn_rejected http_reply http_request 35
104 Improving Bro s Performance Bottlenecks: Single-thread structure & Script interpretation 36
105 Improving Bro s Performance Bottlenecks: Single-thread structure & Script interpretation A High-Level Intermediary Language for Traffic Inspection Host Application HILTI Machine Environment OS Toolchain Application Core C Interface Stubs Analysis Specification Analysis Compiler HILTI Machine Code HILTI Compiler Native Object Code System Linker Native Executable LLVM Runtime Library hiltic hilti-build 36
106 BinPAC: Yacc for Network Protocols 37
107 BinPAC: Yacc for Network Protocols type SMB_header = record { protocol : bytestring &length = 4; command : uint8; status : SMB_error(err_status_type); flags : uint8; flags2 : uint16; pad : padding[12]; tid : uint16; pid : uint16; uid : uint16; mid : uint16; } &let { err_status_type = (flags2 >> 14) & 1; unicode = (flags2 >> 15) & 1; } &byteorder = littleendian; type SMB_error (err_status_type: int) = case err_status_type of { 0 -> dos_error: SMB_dos_error; 1 -> status: int32; }; type SMB_dos_error = record { error_class : uint8; reserved : uint8; error : uint16; }; 37
108 Next-generation BinPAC 38
109 Next-generation BinPAC type Message = unit(body_default: bool) { headers : list<header(self)>; end_of_hdr: /\r?\n/; body : Body([...]) }; HTTP Message 38
110 Next-generation BinPAC type Message = unit(body_default: bool) { headers : list<header(self)>; end_of_hdr: /\r?\n/; body : Body([...]) const HeaderName = /[^:\r\n]+/; const HeaderValue = /[^\r\n]*/; type Header = unit(msg: Message) { name : HeaderName; : /:[\t ]*/; content: HeaderValue; : NewLine; }; HTTP Message }; HTTP Header 38
111 Next-generation BinPAC type Message = unit(body_default: bool) { headers : list<header(self)>; end_of_hdr: NewLine; body : Body(self, self.delivery_mode) if ( self.has_body ); on end_of_hdr { if ( self?.content_length ) self.delivery_mode = DeliveryMode::Length; } if ( self.content_type.startswith("multipart/") ) [... Parse boundary...] [...] var content_length: uint64; var content_type: bytes; var delivery_mode: DeliveryMode; var has_body: bool; var multipart_boundary: bytes; var transfer_encoding: bytes; }; HTTP Message const HeaderName = /[^:\r\n]+/; const HeaderValue = /[^\r\n]*/; type Header = unit(msg: Message) { name : HeaderName &convert=to_lower; : /:[\t ]*/; content: HeaderValue; : NewLine; }; on content { if ( self.name == "content-length" ) { msg.content_length = to_uint(self.content); msg.has_body = True; } if ( self.name == "transfer-encoding" ) { msg.transfer_encoding = self.content; msg.has_body = True; } if ( self.name == "content-type" ) msg.content_type = self.content; HTTP Header 39
112 Next-generation BinPAC type Message = unit(body_default: bool) { headers : list<header(self)>; end_of_hdr: NewLine; body : Body(self, self.delivery_mode) if ( self.has_body ); on end_of_hdr { if ( self?.content_length ) self.delivery_mode = DeliveryMode::Length; } if ( self.content_type.startswith("multipart/") ) [... Parse boundary...] [...] var content_length: uint64; var content_type: bytes; var delivery_mode: DeliveryMode; var has_body: bool; var multipart_boundary: bytes; var transfer_encoding: bytes; }; BinPAC++ Streamlined usage. const HeaderName = /[^:\r\n]+/; const HeaderValue = /[^\r\n]*/; Adding semantics to syntax. type Header = unit(msg: Message) { name : HeaderName &convert=to_lower; : /:[\t ]*/; content: HeaderValue; : NewLine; Decoding layers of protocols. Robust error handling. Fully usable outside of Bro. Compiles to HILTI. }; on content { if ( self.name == "content-length" ) { msg.content_length = to_uint(self.content); msg.has_body = True; } if ( self.name == "transfer-encoding" ) { msg.transfer_encoding = self.content; msg.has_body = True; } if ( self.name == "content-type" ) msg.content_type = self.content; HTTP Message HTTP Header 39
113 Outlook & Conclusion 40
114 More Things in the Bro Queue... 41
115 More Things in the Bro Queue... Comprehensive File Analysis Intelligence Framework Metrics Framework Database interface Packet Filter Framework New/improved protocol analyzers SMB/GridFTP/Modbus/DNP3 Reaction Framework Load-balancer Interface 41
116 The Curse of Success... 42
117 The Curse of Success... Success can be kind of problematic in research... Bro is now used operationally by many sites. Demands of operations community hard to meet for small team. 42
118 The Curse of Success... Success can be kind of problematic in research... Bro is now used operationally by many sites. Demands of operations community hard to meet for small team. Aiming to establish sustainable development model. Modernize the system to make usage and contributions easier. Develop a community around the project. 42
119 The Curse of Success... Success can be kind of problematic in research... Bro is now used operationally by many sites. Demands of operations community hard to meet for small team. Aiming to establish sustainable development model. Modernize the system to make usage and contributions easier. Develop a community around the project. NSF supports work through a 3-year engineering grant. Bro changed a lot over the couples years. Collaboration with National Center for Supercomputing Applications. 42
120 Target: Blue NCSA 43
121 Target: Blue NCSA 10 PF/s peak performance >1 PF/s sustained on applications >300,000 cores >1 Petabyte memory >10 Petabyte disk storage >0.5 Exabyte archival storage Hosted in 88,000-square-foot facility 43
122 Summary 44
123 Summary Bro will keep bridging the research/operations gap. We have plenty more ideas... 44
124 Summary Bro will keep bridging the research/operations gap. We have plenty more ideas... Long-term goal is a sustainable development model. We are planing to offer commercial services and support. 44
125 Summary Bro will keep bridging the research/operations gap. We have plenty more ideas... Long-term goal is a sustainable development model. We are planing to offer commercial services and support. blog.bro-ids.org git.bro-ids.org on Twitter 44
126 Summary Bro will keep bridging the research/operations gap. We have plenty more ideas... Long-term goal is a sustainable development model. We are planing to offer commercial services and support. blog.bro-ids.org git.bro-ids.org on Twitter 44
The Bro Network Security Monitor. Broverview
The Bro Network Security Monitor Broverview Outline 2 Outline Philosophy and Architecture A framework for network traffic analysis. 2 Outline Philosophy and Architecture A framework for network traffic
The Bro Network Security Monitor. Broverview. Bro Workshop 2011. NCSA, Urbana-Champaign, IL. Bro Workshop 2011
The Bro Network Security Monitor Broverview NCSA, Urbana-Champaign, IL Outline 2 Outline Philosophy and Architecture A framework for network traffic analysis. 2 Outline Philosophy and Architecture A framework
The Open Source Bro IDS Overview and Recent Developments
The Open Source Bro IDS Overview and Recent Developments Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org/robin
The Bro Monitoring Platform
Adam Slagell National Center for Supercomputing Applications Borrowed from Robin Sommer International Computer Science Institute What Is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow
The Bro Network Intrusion Detection System
The Bro Network Intrusion Detection System Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org System Philosophy Bro
The Bro Monitoring Platform
Robin Sommer! International Computer Science Institute, &! Lawrence Berkeley National Laboratory [email protected] http://www.icir.org/robin What Is Bro? Packet Capture Traffic Inspection Attack
The Bro Monitoring Platform
Robin Sommer! International Computer Science Institute, &! Lawrence Berkeley National Laboratory [email protected] http://www.icir.org/robin What Is Bro? 2 What Is Bro? Packet Capture 2 What Is Bro?
How to (passively) understand the application layer? Packet Monitoring
How to (passively) understand the application layer? Packet Monitoring 1 What to expect? Overview / What is packet monitoring? How to acquire the data Handling performance bottlenecks Analyzing the transport
An Overview of the Bro Intrusion Detection System
An Overview of the Bro Intrusion Detection System Brian L. Tierney, Vern Paxson, James Rothfuss Lawrence Berkeley National Laboratory Typical Approach: Firewall with default deny policy A blocking router
Monitoring Network Security with the Open-Source Bro NIDS
Monitoring Network Security with the Open-Source Bro NIDS Robin Sommer Lawrence Berkeley National Laboratory & International Computer Science Institute [email protected] http://www.icir.org at Jefferson
Bro at 10 Gps: Current Testing and Plans
U.S. Department of Energy Bro at 10 Gps: Current Testing and Plans Office of Science Brian L. Tierney Lawrence Berkeley National Laboratory Bro s Use at LBL Operational 24 7 since 1996 Monitors traffic
High-Performance Network Security Monitoring at the Lawrence Berkeley National Lab
High-Performance Network Security Monitoring at the Lawrence Berkeley National Lab Strategies for Monitoring External and Internal Activity Robin Sommer Lawrence Berkeley National Laboratory & International
100G Network Monitoring with Bro and Time Machine
UNIVERSITY OF CALIFORNIA 100G Network Monitoring with Bro and Time Machine Vincent Stoffer Cyber Security Engineer CENIC Conference March 11th, 2015 Irvine, CA Agenda Intro / overview 100G monitoring challenges
How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On
Michel Laterman We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply
Configuring Health Monitoring
CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless
A Bro Walk-Through. Robin Sommer International Computer Science Institute & Lawrence Berkeley National Laboratory
A Bro Walk-Through Robin Sommer International Computer Science Institute & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org Doing the Walk-Through... Going from simple
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Flow-level analysis: wireshark and Bro. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis
Flow-level analysis: wireshark and Bro Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis 1 wireshark tshark Network packet analyzer for Unix/Windows Displays detailed packet stats GUI (wireshark) or command-line
Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia
Log Management with Open-Source Tools Risto Vaarandi SEB Estonia Outline Why use open source tools for log management? Widely used logging protocols and recently introduced new standards Open-source syslog
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
Scaling Up Your Network Monitoring: From the Garden Hose to the Fire Hose
UNIVERSITY OF CALIFORNIA Scaling Up Your Network Monitoring: From the Garden Hose to the Fire Hose Vincent Stoffer Cyber Security Engineer Technology Exchange October 28, 2014 Agenda Intro / overview The
The Bro Network Intrusion Detection System
The Bro Network Intrusion Detection System Robin Sommer International Computer Science Institute & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org The Bro NIDS - Outline
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M
Log Management with Open-Source Tools Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M Outline Why do we need log collection and management? Why use open source tools? Widely used logging protocols and recently
Berkley Packet Filters and Open Source Tools. a tranched approach to packet capture analysis at today s network speeds
Berkley Packet Filters and Open Source Tools a tranched approach to packet capture analysis at today s network speeds 1 Agenda Packet Capture overview Bro description Security Onion description The problem
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Attacking the TCP Reassembly Plane of Network Forensics Tools
Attacking the TCP Reassembly Plane of Network Forensics Tools Gérard 12 Thomas Engel 1 1 University of Luxembourg - SECAN LAB 2 SES ASTRA Outline Introduction Definitions and terminology A PCAP file contains
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
Managing Latency in IPS Networks
Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended
How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address
Inter-provider Coordination for Real-Time Tracebacks Kathleen M. Moriarty 2 June 2003 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations, conclusions, and
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
Data Communication I
Data Communication I Urban Bilstrup (E327) 090901 [email protected] www2.hh.se/staff/urban Internet - Sweden, Northern Europe SUNET NORDUnet 2 Internet - Internet Addresses Everyone should be able
CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015
CS 188/219 Scalable Internet Services Andrew Mutz October 8, 2015 For Today About PTEs Empty spots were given out If more spots open up, I will issue more PTEs You must have a group by today. More detail
Transformation of honeypot raw data into structured data
Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research
CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 4 - Application Protocols, Performance Applications FTP: The File Transfer Protocol user at host FTP FTP user client interface local file
A New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams
A New Approach to Network Visibility at UBC Presented by the Network Management Centre and Wireless Infrastructure Teams Agenda Business Drivers Technical Overview Network Packet Broker Tool Network Monitoring
Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview
Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
User-ID Features PAN-OS New Features Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
Introduction. Background
Introduction Bro is an open-source network security monitor which inspects network traffic looking for suspicious activity. The Bro framework provides an extensible scripting language that allows an analysis
Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
FIREWALL AND NAT Lecture 7a
FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security
Improved metrics collection and correlation for the CERN cloud storage test framework
Improved metrics collection and correlation for the CERN cloud storage test framework September 2013 Author: Carolina Lindqvist Supervisors: Maitane Zotes Seppo Heikkila CERN openlab Summer Student Report
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
CSE543 - Computer and Network Security Module: Firewalls
CSE543 - Computer and Network Security Module: Firewalls Professor Trent Jaeger Fall 2010 1 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
CNS-200-1I Basic Administration for Citrix NetScaler 9.0
CNS-200-1I Basic Administration for Citrix NetScaler 9.0 This course covers the initial configuration and administration of Citrix NetScaler 9.0. Learners gain an understanding of NetScaler features such
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm, Network IDS devices use passive network monitoring extensively to detect possible threats. Through passive
Comprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
Basic Internet programming Formalities. Hands-on tools for internet programming
Welcome Basic Internet programming Formalities Hands-on tools for internet programming DD1335 (gruint10) Serafim Dahl [email protected] DD1335 (Lecture 1) Basic Internet Programming Spring 2010 1 / 23
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
Enterprise Application Monitoring with
Enterprise Application Monitoring with 11/10/2007 Presented by James Peel [email protected] / www.altinity.com 1 Who am I? James Peel - [email protected] Job: Managing Director of Altinity
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Network Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
RED HAT SOFTWARE COLLECTIONS BRIDGING DEVELOPMENT AGILITY AND PRODUCTION STABILITY
RED HAT S BRIDGING DEVELOPMENT AGILITY AND PRODUCTION STABILITY TECHNOLOGY BRIEF INTRODUCTION BENEFITS Choose the right runtimes for your project with access to the latest stable versions. Preserve application
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
What is a Bro log? Justin Azoff. Aug 26, 2014
What is a Bro log? Justin Azoff Aug 26, 2014 What is a Bro log? A Bro log is a stream of high level entries that correspond to network events. A file downloaded via HTTP An email sent using SMTP A login
Network Service, Systems and Data Communications Monitoring Policy
Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Cisco IOS Flexible NetFlow Command Reference
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
Linux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
DDoS Protecion Total AnnihilationD. DDoS Mitigation Lab
DDoS Protecion Total AnnihilationD A Industry body formed to foster synergy among stakeholders to promote advancement in DDoS defense knowledge. Independent academic R&D division of Nexusguard building
PAN-OS Syslog Integration
PAN-OS Syslog Integration Tech Note Revision M 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Log Formats...3 TRAFFIC...3 Descriptions...3 Subtype Field...5 Action Field...6 Flags Field...6
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
OpenFlow Based Load Balancing
OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple
CSC574 - Computer and Network Security Module: Firewalls
CSC574 - Computer and Network Security Module: Firewalls Prof. William Enck Spring 2013 1 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,
Monitoring PostgreSQL database with Verax NMS
Monitoring PostgreSQL database with Verax NMS Table of contents Abstract... 3 1. Adding PostgreSQL database to device inventory... 4 2. Adding sensors for PostgreSQL database... 7 3. Adding performance
About This Document 3. Integration and Automation Capabilities 4. Command-Line Interface (CLI) 8. API RPC Protocol 9.
Parallels Panel Contents About This Document 3 Integration and Automation Capabilities 4 Command-Line Interface (CLI) 8 API RPC Protocol 9 Event Handlers 11 Panel Notifications 13 APS Packages 14 C H A
Instructor: Betty O Neil
Introduction to Web Application Development, for CS437/637 Instructor: Betty O Neil 1 Introduction: Internet vs. World Wide Web Internet is an interconnected network of thousands of networks and millions
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that
Outline Definition of Webserver HTTP Static is no fun Software SSL. Webserver. in a nutshell. Sebastian Hollizeck. June, the 4 th 2013
Definition of in a nutshell June, the 4 th 2013 Definition of Definition of Just another definition So what is it now? Example CGI php comparison log-file Definition of a formal definition Aisaprogramthat,usingthe
HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
CS514: Intermediate Course in Computer Systems
: Intermediate Course in Computer Systems Lecture 7: Sept. 19, 2003 Load Balancing Options Sources Lots of graphics and product description courtesy F5 website (www.f5.com) I believe F5 is market leader
Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?
Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6? - and many other vital questions to ask your firewall vendor Zlata Trhulj Agilent Technologies [email protected]
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft Outlook Web
Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced
What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services
Firewalls What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services only authorized traffic is allowed Auditing and
