The Bro Network Security Monitor

Size: px
Start display at page:

Download "The Bro Network Security Monitor"

Transcription

1 Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory

2 What is Bro? 2

3 What is Bro? Packet Capture 2

4 What is Bro? Packet Capture Traffic Inspection 2

5 What is Bro? Packet Capture Traffic Inspection Attack Detection 2

6 What is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow syslog Log Recording 2

7 What is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow syslog Log Recording Flexibility Abstraction Data Structures 2

8 What is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow syslog Log Recording Flexibility Abstraction Data Structures 2

9 What is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow syslog Log Recording Flexibility Abstraction Data Structures 2

10 What is Bro? Packet Capture Traffic Inspection Attack Detection Domain-specific Python NetFlow syslog Log Recording Flexibility Abstraction Data Structures 2

11 Philosophy Fundamentally different from other IDS. Need to reset your idea of an IDS before starting to use Bro. Real-time network analysis framework. Primarily an IDS, but many use it for general traffic analysis. Can accommodate a range of detection approaches. Policy-neutral at the core. Highly stateful. Tracks extensive application-layer network state. Supports forensics. Extensively logs what it sees. 3

12 Bro History Vern writes 1st line of code 4

13 Bro History Vern writes 1st line of code LBNL starts using Bro operationally v0.2 1st CHANGES entry v0.4 HTTP analysis Scan detector IP fragments Linux support v0.6 RegExps Login analysis v0.7a90 Profiling State Mgmt v0.7a175/0.8ax Signatures SMTP IPv6 support User manual v0.8ax/0.9ax SSL/SMB STABLE releases BroLite v1.1/v1.2 when Stmt Resource tuning Broccoli DPD v1.0 BinPAC IRC/RPC analyzers 64-bit support Sane version numbers v1.5 BroControl v1.4 DHCP/BitTorrent HTTP entities NetFlow Bro Lite Deprecated Bro SDCI Bro 2.0 New Scripts Bro 2.1 IPv6 Input Framework v0.7a48 Consistent CHANGES 0.8a37 Communication Persistence Namespaces Log Rotation v1.3 Ctor expressions GeoIP Conn Compressor 4

14 Bro History Host Context Time Machine Enterprise Traffic TRW State Mgmt. Independ. State Bro Cluster Shunt Academic Publications USENIX Paper Stepping Stone Detector Anonymizer Active Mapping Context Signat. BinPAC DPD 2nd Path Parallel Prototype Autotuning Input Framework Vern writes 1st line of code LBNL starts using Bro operationally v0.2 1st CHANGES entry v0.4 HTTP analysis Scan detector IP fragments Linux support v0.6 RegExps Login analysis v0.7a90 Profiling State Mgmt v0.7a175/0.8ax Signatures SMTP IPv6 support User manual v0.8ax/0.9ax SSL/SMB STABLE releases BroLite v1.1/v1.2 when Stmt Resource tuning Broccoli DPD v1.0 BinPAC IRC/RPC analyzers 64-bit support Sane version numbers v1.5 BroControl v1.4 DHCP/BitTorrent HTTP entities NetFlow Bro Lite Deprecated Bro SDCI Bro 2.0 New Scripts Bro 2.1 IPv6 Input Framework v0.7a48 Consistent CHANGES 0.8a37 Communication Persistence Namespaces Log Rotation v1.3 Ctor expressions GeoIP Conn Compressor 4

15 Who s Using It? Installations across the US Universities Research Labs Supercomputer Centers Industry Examples Lawrence Berkeley National Lab Indiana University National Center for Supercomputing Applications National Center for Atmospheric Research... and many more sites Fully integrated into Security Onion Popular security-oriented Linux distribution Recent User Meetings Bro Workshop 2011 at NCSA Bro Exchange 2012 at NCAR Each attended by about 50 operators from from organizations 5

16 Deployment Internet Internal Network 6

17 Deployment Internet Tap Internal Network Bro 6

18 Deployment Internet Tap Internal Network Bro Runs on commodity platforms.! Standard PCs & NICs. Supports FreeBSD/Linux/OS X. 6

19 Example Logs 7

20 Example Logs > bro -i en0 [... wait...] > cat conn.log 7

21 Example Logs > bro -i en0 [... wait...] > cat conn.log #fields ts id.orig_h id.orig_p id.resp_h id.resp_p proto service duration tcp http tcp http tcp http tcp http tcp http tcp http tcp http

22 Example Logs > bro -i en0 [... wait...] > cat conn.log #fields ts id.orig_h id.orig_p id.resp_h id.resp_p proto service duration tcp http tcp http tcp http tcp http tcp http tcp http tcp http > cat http.log 7

23 Example Logs > bro -i en0 [... wait...] > cat conn.log #fields ts id.orig_h id.orig_p id.resp_h id.resp_p proto service duration tcp http tcp http tcp http tcp http tcp http tcp http tcp http > cat http.log #fields ts id.orig_h id.orig_p [...] host uri status_code user_agent [...] docs.python.org /lib/lib.css 200 Mozilla/ docs.python.org /icons/previous.png 304 Mozilla/ docs.python.org /lib/lib.html 200 Mozilla/ docs.python.org /icons/up.png 304 Mozilla/ docs.python.org /icons/next.png 304 Mozilla/ docs.python.org /icons/contents.png 304 Mozilla/ docs.python.org /icons/modules.png 304 Mozilla/ docs.python.org /icons/index.png 304 Mozilla/ / 200 Mozilla/5.0 7

24 Example Logs > bro -i en0 [... wait...] > cat conn.log #fields ts id.orig_h id.orig_p id.resp_h id.resp_p proto service duration tcp http tcp http tcp http [...] host uri status_code 80 tcp user_agent http [...] docs.python.org /lib/lib.css tcp Mozilla/5.0 http tcp http docs.python.org /icons/previous.png tcp Mozilla/5.0 http docs.python.org /lib/lib.html 200 Mozilla/5.0 > cat docs.python.org http.log /icons/up.png 304 Mozilla/5.0 docs.python.org /icons/next.png 304 Mozilla/5.0 #fields ts id.orig_h id.orig_p [...] host uri status_code user_agent [...] docs.python.org /icons/contents.png docs.python.org /lib/lib.css Mozilla/5.0 Mozilla/ docs.python.org /icons/previous.png 304 docs.python.org /icons/modules.png 304 Mozilla/ docs.python.org /lib/lib.html 200 Mozilla/ docs.python.org /icons/index.png docs.python.org /icons/up.png Mozilla/ docs.python.org /icons/next.png 304 Mozilla/ / docs.python.org /icons/contents.png Mozilla/5.0 Mozilla/ docs.python.org /icons/modules.png 304 Mozilla/ docs.python.org /icons/index.png 304 Mozilla/ / 200 Mozilla/5.0 7

25 Identifying HTTP Servers 8

26 Identifying HTTP Servers Server Addresses a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com nuq04s07-in-f27.1e100.net a deploy.akamaitechnologies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com nuq04s06-in-f27.1e100.net upload-lb.pmtpa.wikimedia.org nuq04s08-in-f27.1e100.net 8

27 Identifying HTTP Servers Server Addresses HTTP Host Headers a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com nuq04s07-in-f27.1e100.net a deploy.akamaitechnologies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com a deploy.akamaitechnolgies.com nuq04s06-in-f27.1e100.net upload-lb.pmtpa.wikimedia.org nuq04s08-in-f27.1e100.net ad.doubleclick.net ad.yieldmanager.com b.scorecardresearch.com clients1.google.com googleads.g.doubleclick.net graphics8.nytimes.com l.yimg.com liveupdate.symantecliveupdate.com mt0.google.com pixel.quantserve.com platform.twitter.com profile.ak.fbcdn.net s0.2mdn.net safebrowsing-cache.google.com static.ak.fbcdn.net swcdn.apple.com upload.wikimedia.org

28 File Content 9

29 File Content GET /skins-1.5/common/images/magnify-clip.png image/png GET /skins-1.5/monobook/external.png image/png GET /softw/90/update/avg9infoavi.ctf text/plain GET /softw/90/update/avg9infowin.ctf text/plain GET /softw/90/update/u7avi1777u1705ff.bin application/x-dosexec 0210a9516dd34abc481683f877bd GET /softw/90/update/u7avi1778u1705z7.bin application/x-dosexec 9bd8e3a274d8ada852bc3d bf GET /softw/90/update/u7iavi2511u2510ff.bin application/x-dosexec 5e63f63fd a56dbd89d8688f GET /softw/90/update/u7iavi2512u2511z7.bin application/x-dosexec a8e1ef490967ef7eb6641bef9eed GET /softw/90/update/x8xplsb2_118c8.bin application/x-dosexec e c5550e9fbf33ef15fed75e5a GET /softw/90/update/x8xplsc_149d148c8.bin application/x-dosexec db5b04f3c45da4c0686c678bfd0e241c GET /sports/ text/html - 9

30 Software Logging 10

31 Software Logging Windows-Update-Agent - - Windows-Update-Agent Microsoft-IIS 6 0 Microsoft-IIS/ ASP.NET - - ASP.NET Microsoft-IIS 7 0 Microsoft-IIS/ ASP.NET - - ASP.NET SCSDK 6 0 SCSDK Apache 2 2 Apache/2.2.9 (Debian) PHP/ lenny PHP 5 2 PHP/ lenny Apache 2 2 Apache/2.2.9 (Debian) PHP/ lenny PHP 5 2 PHP/ lenny Apache 2 2 Apache/2.2.9 (Debian) PHP/ lenny PHP 5 2 PHP/ lenny Apache 2 2 Apache/2.2.9 (Debian) PHP/ lenny PHP 5 2 PHP/ lenny Apache 2 2 Apache/2.2.9 (Debian) PHP/ lenny PHP 5 2 PHP/ lenny Apache 2 0 Apache/ (Debian GNU/Linux) PHP 4 3 PHP/ Apache 2 2 Apache/2.2.9 (Debian) PHP/ lenny PHP 5 2 PHP/ lenny3 10

32 SSL Certificate Logging 11

33 SSL Certificate Logging CN=Microsoft Secure Server Authority,DC=redmond,DC=corp,DC=microsoft,DC=com CN=Sun Microsystems Inc SSL CA,OU=Class 3 MPKI Secure Server CA,OU=VeriSign CN=Microsoft Secure Server Authority,DC=redmond,DC=corp,DC=microsoft,DC=com CN=Microsoft Secure Server Authority,DC=redmond,DC=corp,DC=microsoft,DC=com CN=VeriSign Class 3 Extended Validation SSL CA,OU=Terms of use at CN=Akamai Subordinate CA 3,O=Akamai Technologies Inc,C=US CN=Akamai Subordinate CA 3,O=Akamai Technologies Inc,C=US OU=Equifax Secure Certificate Authority,O=Equifax,C=US CN=VeriSign Class 3 Secure Server CA,OU=Terms of use at CN=Akamai Subordinate CA 3,O=Akamai Technologies Inc,C=US CN=Network Solutions Certificate Authority,O=Network Solutions L.L.C.,C=US OU=Equifax Secure Certificate Authority,O=Equifax,C=US OU=Equifax Secure Certificate Authority,O=Equifax,C=US CN=Microsoft Secure Server Authority,DC=redmond,DC=corp,DC=microsoft,DC=com 11

34 Brownian 12

35 Architecture Packets Network 13

36 Architecture Events Protocol Decoding Event Engine Packets Network 13

37 Architecture Logs Notification Analysis Logic Policy Script Interpreter Events Protocol Decoding Event Engine Packets Network 13

38 Architecture Logs Notification User Interface Analysis Logic Policy Script Interpreter Events Protocol Decoding Event Engine Packets Network 13

39 Event Model Web Client Request for /index.html Web Server /4321 Status OK plus data /80 14

40 Event Model Web Client Request for /index.html Web Server /4321 Status OK plus data /80... Stream of TCP packets... SYN SYN ACK ACK ACK ACK FIN FIN 14

41 Event Model Web Client Request for /index.html Web Server /4321 Status OK plus data /80... Stream of TCP packets... SYN SYN ACK ACK ACK ACK FIN FIN Event connection_established( / /80) 14

42 Event Model Web Client Request for /index.html Web Server /4321 Status OK plus data /80... Stream of TCP packets... SYN SYN ACK ACK ACK ACK FIN FIN Event connection_established( / /80) TCP stream reassembly for originator Event http_request( / /80, GET, /index.html ) 14

43 Event Model Web Client Request for /index.html Web Server /4321 Status OK plus data /80... Stream of TCP packets... SYN SYN ACK ACK ACK ACK FIN FIN Event connection_established( / /80) TCP stream reassembly for originator Event http_request( / /80, GET, /index.html ) TCP stream reassembly for responder Event http_reply( / /80, 200, OK, data) 14

44 Event Model Web Client Request for /index.html Web Server /4321 Status OK plus data /80... Stream of TCP packets... SYN SYN ACK ACK ACK ACK FIN FIN Event connection_established( / /80) TCP stream reassembly for originator Event http_request( / /80, GET, /index.html ) TCP stream reassembly for responder Event http_reply( / /80, 200, OK, data) Event connection_finished( /4321, /80) 14

45 Script Example: Matching URLs Task: Report all Web requests for files called passwd. 15

46 Script Example: Matching URLs Task: Report all Web requests for files called passwd. event http_request(c: connection, # Connection. method: string, # HTTP method. original_uri: string, # Requested URL. unescaped_uri: string, # Decoded URL. version: string) # HTTP version. { if ( method == "GET" && unescaped_uri == /.*passwd/ ) NOTICE(...); # Alarm. } 15

47 Script Example: Scan Detector Task: Count failed connection attempts per source address. 16

48 Script Example: Scan Detector Task: Count failed connection attempts per source address. global attempts: table[addr] of count &default=0; event connection_rejected(c: connection) { local source = c$id$orig_h; # Get source address. local n = ++attempts[source]; # Increase counter. if ( n == SOME_THRESHOLD ) # Check for threshold. NOTICE(...); # Alarm. } 16

49 Distributed Scripts 17

50 Distributed Scripts Bro comes with >10,000 lines of script code. Prewritten functionality that s just loaded. Scripts generate all the logs. Amendable to extensive customization and extension. 17

51 Bro Ecosystem Internet Tap Internal Network Bro 18

52 Bro Ecosystem Internet Tap Internal Network Bro Control Output BroControl User Interface 18

53 Bro Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Control Output BroControl User Interface 18

54 Bro Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output BroControl User Interface 18

55 Bro Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output BroControl User Interface Events Bro Client Communication Library Broccoli 18

56 Bro Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output BroControl User Interface Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby (Broccoli Perl) 18

57 Bro Ecosystem Time Machine Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output BroControl User Interface Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby (Broccoli Perl) 18

58 Bro Ecosystem Time Machine Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output bro-aux BinPAC capstats BroControl Events Bro Client Communication Library Broccoli Python BTest tracesummary Broccoli Broccoli Ruby User Interface (Broccoli Perl) 18

59 Bro Ecosystem Time Machine Bro Distribution bro-2.1.tar.gz Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output bro-aux BTest BinPAC tracesummary capstats BroControl Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) 18

60 Bro Ecosystem Time Machine Bro Distribution bro-2.1.tar.gz Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output bro-aux BTest BinPAC tracesummary capstats BroControl Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) git://git.bro-ids.org 18

61 Bro Cluster Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Events State External Bro Control Output bro-aux BinPAC capstats BroControl Events Bro Client Communication Library Broccoli Python BTest tracesummary Broccoli Broccoli Ruby User Interface (Broccoli Perl) 19

62 Bro Cluster Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Events State External Bro Control Output bro-aux BinPAC capstats BroControl Events Bro Client Communication Library Broccoli Python BTest tracesummary Broccoli Broccoli Ruby User Interface (Broccoli Perl) 19

63 Bro Cluster Ecosystem Internet Tap Load- Balancer Internal Network Contributed Scripts Functionality Bro Events State External Bro Control Output bro-aux BinPAC capstats BroControl Events Bro Client Communication Library Broccoli Python BTest tracesummary Broccoli Broccoli Ruby User Interface (Broccoli Perl) 19

64 Bro Cluster Ecosystem Internet Tap Internal Network Packets Load- Balancer Contributed Scripts Functionality Bro Bro Bro Bro Bro Events State External Bro Control Output bro-aux BTest BinPAC tracesummary capstats BroControl Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) 19

65 Bro Cluster Ecosystem Internet Tap Internal Network Packets Load- Balancer Contributed Scripts Functionality Bro Bro Bro Bro Bro Events State External Bro bro-aux BTest BinPAC tracesummary capstats Control Control Output BroControl Output Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) 19

66 Bro Cluster Ecosystem Internet Tap Internal Network Packets Load- Balancer Frontend Contributed Scripts Functionality Bro Bro Bro Bro Bro Workers Events State External Bro bro-aux BTest BinPAC tracesummary capstats Control Control Output Manager BroControl Output Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) 19

67 A Production Load-Balancer cflow: 10GE line-rate, stand-alone load-balancer 10 Gb/s in/out Web & CLI Filtering capabilities Available from cpacket 20

68 A Production Load-Balancer cflow: 10GE line-rate, stand-alone load-balancer 10 Gb/s in/out Web & CLI Filtering capabilities Available from cpacket 20

69 Indiana University Indiana University OpenFlow Deployment v.1.0 Bloomington CIC Chicago Chicago Testlab 2 Nodes 10 Gig via 10 Gig via DWDM System via 8 OpenFlow Switches Test Servers 2 Nodes 5 Nodes Indianapolis ICTC Testpoint 2 Nodes IU Production Deployment IU Wireless SSID: OpenFlow Layer 3 router on OpenFlow switches InterOp lab Workshop Lindley Hall Telcom Bldn Informatics East Informatics West Monitoring Indianapolis VM Server 4 OpenFlow switches IU Core Network 6 x 10G 12 x 10G OpenFlow load balancer IDS Cluster 12 servers Source: Indiana University 21

70 Indiana University Indiana University OpenFlow Deployment v.1.0 Bloomington CIC Chicago Chicago Testlab 2 Nodes 10 Gig via 10 Gig via DWDM System via 8 OpenFlow Switches Test Servers 2 Nodes 5 Nodes Indianapolis ICTC Testpoint 2 Nodes IU Production Deployment IU Wireless SSID: OpenFlow Layer 3 router on OpenFlow switches InterOp lab Workshop Lindley Hall Telcom Bldn Informatics East Informatics West Monitoring Indianapolis VM Server 4 OpenFlow switches IU Core Network 6 x 10G 12 x 10G OpenFlow load balancer IDS Cluster 12 servers Source: Indiana University 21

71 External Events: Broccoli 22

72 External Events: Broccoli Auditing SSHD 22

73 External Events: Broccoli Solu5on&Overview& Auditing SSHD PARENT' SSHD' CHILD' SSHD' STUNNEL' SSLOGMUX' BROPIPE' Source: Scott Campbell / NERSC 5& 22

74 NERSC reserves the right to remove any data at any time and/or transfer data to NERSC Computer Use Policies Form other individuals working on the same or similar project once a user account is deleted or a person no longer has a business association with NERSC. Account Usage Users are not allowed to share their accounts with others. Monitoring and Privacy Users have no explicit or implicit expectation of privacy. NERSC retains the right to monitor the content of all activities on NERSC systems and networks and access any computer files without prior knowledge or consent of users, senders or recipients. NERSC may retain copies of any network traffic, computer files or messages indefinitely without prior knowledge or consent. NERSC personnel and users are required to address, safeguard against and report misuse, abuse and criminal activities. Misuse of NERSC resources can lead to temporary or permanent disabling of accounts, loss of DOE allocations, and administrative or legal actions. revision 1.1 date: 2007/October/11 20:06:56 23

75 ons for the Classroom The Security Fence Presented by NIEonline.com and the Association of American Editorial Cartoonists (AAEC) vs. y lines g civil me of as been n the ttacks the d peoe up otecttion ts in ction toon illustrates the problem of Cartoon Courtesy Clay Bennett / The Christian Science Monitor 24

76 Version 2.0 (Jan 2012) 25

77 Version 2.0 (Jan 2012) Default scripts rewritten from scratch. Focus on ease of use and operational deployment. New logging infrastructure. New build and packaging system. New auto-documentation system (Broxygen). Lots of bugs fixed. Obsolete code removed. New development infrastructure. New regression testing framework. New web server. New mailing lists. New logo. 25

78 Just released... 26

79 Just released... Bro 2.1 Comprehensive IPv6 support. Tunnel decapsulation. New logging formats (DataSeries / ElasticSearch) Input Framework 26

80 Input Framework Example: Blacklists IP Reason Timestamp Connected to honeypot Too many DNS requests Sent spam

81 User Interface 28

82 User Interface type Index: record { ip: addr; }; type Value: record { reason: string; timestamp: time; }; global blacklist: table[addr] of Value; Input::add_table(source="blacklist.tsv", idx=index, val=value, destination=blacklist); (Syntax simplified.) 28

83 User Interface type Index: record { ip: addr; }; type Value: record { reason: string; timestamp: time; }; global blacklist: table[addr] of Value; Input::add_table(source="blacklist.tsv", idx=index, val=value, destination=blacklist); (Syntax simplified.) event connection_established(c: connection) { if ( c$id$orig_h in blacklist ) alarm(...) } 28

84 Current Research 29

85 Performace: 100 Gb/s Now these sites need a monitoring solution... Working with cpacket on a 100GE loadbalancer! DOE/ESNet 100G Advanced Networking Initiative Source: ESNet Source: ESNet 30

86 Production Backbone in Planing 31

87 100 Gb/s Load-balancer

88 100 Gb/s Load-balancer 100Gbps cflow 100G 10Gb/s Bro Cluster

89 100 Gb/s Load-balancer 100Gbps cflow 100G API 10Gb/s Control Bro Cluster

90 Concurrent Analysis Logs Notification Analysis Logic Policy Script Interpreter Events Protocol Decoding Event Engine Packets Network 33

91 Concurrent Analysis Logs Notification Single Thread Analysis Logic Policy Script Interpreter Events Protocol Decoding Event Engine Packets Network 33

92 Architecture Notification Detection Logic Scripting Language Script Threads Events Packet Analysis Event Engine Event Engine Threads Packets Dispatcher Packet Dispatcher (NIC) Network 34

93 Architecture Notification Detection Logic Scripting Language Script Threads Events Packet Analysis Event Engine Event Engine Threads Cluster in a Box Packets Dispatcher Packet Dispatcher (NIC) Network 34

94 Architecture How to parallelize a scripting language? Notification Detection Logic Scripting Language Script Threads Events Packet Analysis Cluster in a Box Event Engine Packets Dispatcher Event Engine Threads Packet Dispatcher (NIC) Network 34

95 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue 35

96 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A http_request 35

97 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A http_request http_reply Conn A 35

98 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A http_request http_reply Conn A Conn B http_request 35

99 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A Conn A Conn B Orig X http_request http_reply http_request conn_rejected 35

100 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A Conn A Conn B Orig X Orig Y http_request http_reply http_request conn_rejected conn_rejected 35

101 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A Conn A Conn B Orig X Orig Y Orig X http_request http_reply http_request conn_rejected conn_rejected conn_rejected 35

102 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A Conn A Conn B Orig X Orig Y Orig X Conn B http_request http_reply http_request conn_rejected conn_rejected conn_rejected http_reply 35

103 Parallel Event Scheduling Threaded Script Interpreter Thread 1 Thread 2 Thread 3 Thread 4 Thread n Queue Queue Queue Queue Queue Queue Conn A Conn A Conn B Orig X Orig Y Orig X Conn B Conn A http_request http_reply http_request conn_rejected conn_rejected conn_rejected http_reply http_request 35

104 Improving Bro s Performance Bottlenecks: Single-thread structure & Script interpretation 36

105 Improving Bro s Performance Bottlenecks: Single-thread structure & Script interpretation A High-Level Intermediary Language for Traffic Inspection Host Application HILTI Machine Environment OS Toolchain Application Core C Interface Stubs Analysis Specification Analysis Compiler HILTI Machine Code HILTI Compiler Native Object Code System Linker Native Executable LLVM Runtime Library hiltic hilti-build 36

106 BinPAC: Yacc for Network Protocols 37

107 BinPAC: Yacc for Network Protocols type SMB_header = record { protocol : bytestring &length = 4; command : uint8; status : SMB_error(err_status_type); flags : uint8; flags2 : uint16; pad : padding[12]; tid : uint16; pid : uint16; uid : uint16; mid : uint16; } &let { err_status_type = (flags2 >> 14) & 1; unicode = (flags2 >> 15) & 1; } &byteorder = littleendian; type SMB_error (err_status_type: int) = case err_status_type of { 0 -> dos_error: SMB_dos_error; 1 -> status: int32; }; type SMB_dos_error = record { error_class : uint8; reserved : uint8; error : uint16; }; 37

108 Next-generation BinPAC 38

109 Next-generation BinPAC type Message = unit(body_default: bool) { headers : list<header(self)>; end_of_hdr: /\r?\n/; body : Body([...]) }; HTTP Message 38

110 Next-generation BinPAC type Message = unit(body_default: bool) { headers : list<header(self)>; end_of_hdr: /\r?\n/; body : Body([...]) const HeaderName = /[^:\r\n]+/; const HeaderValue = /[^\r\n]*/; type Header = unit(msg: Message) { name : HeaderName; : /:[\t ]*/; content: HeaderValue; : NewLine; }; HTTP Message }; HTTP Header 38

111 Next-generation BinPAC type Message = unit(body_default: bool) { headers : list<header(self)>; end_of_hdr: NewLine; body : Body(self, self.delivery_mode) if ( self.has_body ); on end_of_hdr { if ( self?.content_length ) self.delivery_mode = DeliveryMode::Length; } if ( self.content_type.startswith("multipart/") ) [... Parse boundary...] [...] var content_length: uint64; var content_type: bytes; var delivery_mode: DeliveryMode; var has_body: bool; var multipart_boundary: bytes; var transfer_encoding: bytes; }; HTTP Message const HeaderName = /[^:\r\n]+/; const HeaderValue = /[^\r\n]*/; type Header = unit(msg: Message) { name : HeaderName &convert=to_lower; : /:[\t ]*/; content: HeaderValue; : NewLine; }; on content { if ( self.name == "content-length" ) { msg.content_length = to_uint(self.content); msg.has_body = True; } if ( self.name == "transfer-encoding" ) { msg.transfer_encoding = self.content; msg.has_body = True; } if ( self.name == "content-type" ) msg.content_type = self.content; HTTP Header 39

112 Next-generation BinPAC type Message = unit(body_default: bool) { headers : list<header(self)>; end_of_hdr: NewLine; body : Body(self, self.delivery_mode) if ( self.has_body ); on end_of_hdr { if ( self?.content_length ) self.delivery_mode = DeliveryMode::Length; } if ( self.content_type.startswith("multipart/") ) [... Parse boundary...] [...] var content_length: uint64; var content_type: bytes; var delivery_mode: DeliveryMode; var has_body: bool; var multipart_boundary: bytes; var transfer_encoding: bytes; }; BinPAC++ Streamlined usage. const HeaderName = /[^:\r\n]+/; const HeaderValue = /[^\r\n]*/; Adding semantics to syntax. type Header = unit(msg: Message) { name : HeaderName &convert=to_lower; : /:[\t ]*/; content: HeaderValue; : NewLine; Decoding layers of protocols. Robust error handling. Fully usable outside of Bro. Compiles to HILTI. }; on content { if ( self.name == "content-length" ) { msg.content_length = to_uint(self.content); msg.has_body = True; } if ( self.name == "transfer-encoding" ) { msg.transfer_encoding = self.content; msg.has_body = True; } if ( self.name == "content-type" ) msg.content_type = self.content; HTTP Message HTTP Header 39

113 Outlook & Conclusion 40

114 More Things in the Bro Queue... 41

115 More Things in the Bro Queue... Comprehensive File Analysis Intelligence Framework Metrics Framework Database interface Packet Filter Framework New/improved protocol analyzers SMB/GridFTP/Modbus/DNP3 Reaction Framework Load-balancer Interface 41

116 The Curse of Success... 42

117 The Curse of Success... Success can be kind of problematic in research... Bro is now used operationally by many sites. Demands of operations community hard to meet for small team. 42

118 The Curse of Success... Success can be kind of problematic in research... Bro is now used operationally by many sites. Demands of operations community hard to meet for small team. Aiming to establish sustainable development model. Modernize the system to make usage and contributions easier. Develop a community around the project. 42

119 The Curse of Success... Success can be kind of problematic in research... Bro is now used operationally by many sites. Demands of operations community hard to meet for small team. Aiming to establish sustainable development model. Modernize the system to make usage and contributions easier. Develop a community around the project. NSF supports work through a 3-year engineering grant. Bro changed a lot over the couples years. Collaboration with National Center for Supercomputing Applications. 42

120 Target: Blue NCSA 43

121 Target: Blue NCSA 10 PF/s peak performance >1 PF/s sustained on applications >300,000 cores >1 Petabyte memory >10 Petabyte disk storage >0.5 Exabyte archival storage Hosted in 88,000-square-foot facility 43

122 Summary 44

123 Summary Bro will keep bridging the research/operations gap. We have plenty more ideas... 44

124 Summary Bro will keep bridging the research/operations gap. We have plenty more ideas... Long-term goal is a sustainable development model. We are planing to offer commercial services and support. 44

125 Summary Bro will keep bridging the research/operations gap. We have plenty more ideas... Long-term goal is a sustainable development model. We are planing to offer commercial services and support. blog.bro-ids.org git.bro-ids.org on Twitter 44

126 Summary Bro will keep bridging the research/operations gap. We have plenty more ideas... Long-term goal is a sustainable development model. We are planing to offer commercial services and support. blog.bro-ids.org git.bro-ids.org on Twitter 44

The Bro Network Security Monitor. Broverview

The Bro Network Security Monitor. Broverview The Bro Network Security Monitor Broverview Outline 2 Outline Philosophy and Architecture A framework for network traffic analysis. 2 Outline Philosophy and Architecture A framework for network traffic

More information

The Bro Network Security Monitor. Broverview. Bro Workshop 2011. NCSA, Urbana-Champaign, IL. Bro Workshop 2011

The Bro Network Security Monitor. Broverview. Bro Workshop 2011. NCSA, Urbana-Champaign, IL. Bro Workshop 2011 The Bro Network Security Monitor Broverview NCSA, Urbana-Champaign, IL Outline 2 Outline Philosophy and Architecture A framework for network traffic analysis. 2 Outline Philosophy and Architecture A framework

More information

The Open Source Bro IDS Overview and Recent Developments

The Open Source Bro IDS Overview and Recent Developments The Open Source Bro IDS Overview and Recent Developments Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org/robin

More information

The Bro Monitoring Platform

The Bro Monitoring Platform Adam Slagell National Center for Supercomputing Applications Borrowed from Robin Sommer International Computer Science Institute What Is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow

More information

The Bro Network Intrusion Detection System

The Bro Network Intrusion Detection System The Bro Network Intrusion Detection System Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org System Philosophy Bro

More information

The Bro Monitoring Platform

The Bro Monitoring Platform Robin Sommer! International Computer Science Institute, &! Lawrence Berkeley National Laboratory [email protected] http://www.icir.org/robin What Is Bro? Packet Capture Traffic Inspection Attack

More information

The Bro Monitoring Platform

The Bro Monitoring Platform Robin Sommer! International Computer Science Institute, &! Lawrence Berkeley National Laboratory [email protected] http://www.icir.org/robin What Is Bro? 2 What Is Bro? Packet Capture 2 What Is Bro?

More information

How to (passively) understand the application layer? Packet Monitoring

How to (passively) understand the application layer? Packet Monitoring How to (passively) understand the application layer? Packet Monitoring 1 What to expect? Overview / What is packet monitoring? How to acquire the data Handling performance bottlenecks Analyzing the transport

More information

An Overview of the Bro Intrusion Detection System

An Overview of the Bro Intrusion Detection System An Overview of the Bro Intrusion Detection System Brian L. Tierney, Vern Paxson, James Rothfuss Lawrence Berkeley National Laboratory Typical Approach: Firewall with default deny policy A blocking router

More information

Monitoring Network Security with the Open-Source Bro NIDS

Monitoring Network Security with the Open-Source Bro NIDS Monitoring Network Security with the Open-Source Bro NIDS Robin Sommer Lawrence Berkeley National Laboratory & International Computer Science Institute [email protected] http://www.icir.org at Jefferson

More information

Bro at 10 Gps: Current Testing and Plans

Bro at 10 Gps: Current Testing and Plans U.S. Department of Energy Bro at 10 Gps: Current Testing and Plans Office of Science Brian L. Tierney Lawrence Berkeley National Laboratory Bro s Use at LBL Operational 24 7 since 1996 Monitors traffic

More information

High-Performance Network Security Monitoring at the Lawrence Berkeley National Lab

High-Performance Network Security Monitoring at the Lawrence Berkeley National Lab High-Performance Network Security Monitoring at the Lawrence Berkeley National Lab Strategies for Monitoring External and Internal Activity Robin Sommer Lawrence Berkeley National Laboratory & International

More information

100G Network Monitoring with Bro and Time Machine

100G Network Monitoring with Bro and Time Machine UNIVERSITY OF CALIFORNIA 100G Network Monitoring with Bro and Time Machine Vincent Stoffer Cyber Security Engineer CENIC Conference March 11th, 2015 Irvine, CA Agenda Intro / overview 100G monitoring challenges

More information

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On Michel Laterman We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless

More information

A Bro Walk-Through. Robin Sommer International Computer Science Institute & Lawrence Berkeley National Laboratory

A Bro Walk-Through. Robin Sommer International Computer Science Institute & Lawrence Berkeley National Laboratory A Bro Walk-Through Robin Sommer International Computer Science Institute & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org Doing the Walk-Through... Going from simple

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

Flow-level analysis: wireshark and Bro. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis

Flow-level analysis: wireshark and Bro. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Flow-level analysis: wireshark and Bro Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis 1 wireshark tshark Network packet analyzer for Unix/Windows Displays detailed packet stats GUI (wireshark) or command-line

More information

Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia

Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia Log Management with Open-Source Tools Risto Vaarandi SEB Estonia Outline Why use open source tools for log management? Widely used logging protocols and recently introduced new standards Open-source syslog

More information

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic

More information

Scaling Up Your Network Monitoring: From the Garden Hose to the Fire Hose

Scaling Up Your Network Monitoring: From the Garden Hose to the Fire Hose UNIVERSITY OF CALIFORNIA Scaling Up Your Network Monitoring: From the Garden Hose to the Fire Hose Vincent Stoffer Cyber Security Engineer Technology Exchange October 28, 2014 Agenda Intro / overview The

More information

The Bro Network Intrusion Detection System

The Bro Network Intrusion Detection System The Bro Network Intrusion Detection System Robin Sommer International Computer Science Institute & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org The Bro NIDS - Outline

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M

Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M Log Management with Open-Source Tools Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M Outline Why do we need log collection and management? Why use open source tools? Widely used logging protocols and recently

More information

Berkley Packet Filters and Open Source Tools. a tranched approach to packet capture analysis at today s network speeds

Berkley Packet Filters and Open Source Tools. a tranched approach to packet capture analysis at today s network speeds Berkley Packet Filters and Open Source Tools a tranched approach to packet capture analysis at today s network speeds 1 Agenda Packet Capture overview Bro description Security Onion description The problem

More information

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

Attacking the TCP Reassembly Plane of Network Forensics Tools

Attacking the TCP Reassembly Plane of Network Forensics Tools Attacking the TCP Reassembly Plane of Network Forensics Tools Gérard 12 Thomas Engel 1 1 University of Luxembourg - SECAN LAB 2 SES ASTRA Outline Introduction Definitions and terminology A PCAP file contains

More information

Network Traffic Analysis

Network Traffic Analysis 2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing

More information

Managing Latency in IPS Networks

Managing Latency in IPS Networks Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended

More information

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address Inter-provider Coordination for Real-Time Tracebacks Kathleen M. Moriarty 2 June 2003 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations, conclusions, and

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Basic & Advanced Administration for Citrix NetScaler 9.2

Basic & Advanced Administration for Citrix NetScaler 9.2 Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios

More information

Data Communication I

Data Communication I Data Communication I Urban Bilstrup (E327) 090901 [email protected] www2.hh.se/staff/urban Internet - Sweden, Northern Europe SUNET NORDUnet 2 Internet - Internet Addresses Everyone should be able

More information

CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015

CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015 CS 188/219 Scalable Internet Services Andrew Mutz October 8, 2015 For Today About PTEs Empty spots were given out If more spots open up, I will issue more PTEs You must have a group by today. More detail

More information

Transformation of honeypot raw data into structured data

Transformation of honeypot raw data into structured data Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research

More information

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol CS640: Introduction to Computer Networks Aditya Akella Lecture 4 - Application Protocols, Performance Applications FTP: The File Transfer Protocol user at host FTP FTP user client interface local file

More information

A New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams

A New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams A New Approach to Network Visibility at UBC Presented by the Network Management Centre and Wireless Infrastructure Teams Agenda Business Drivers Technical Overview Network Packet Broker Tool Network Monitoring

More information

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each

More information

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider

More information

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your

More information

User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks User-ID Features PAN-OS New Features Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

Introduction. Background

Introduction. Background Introduction Bro is an open-source network security monitor which inspects network traffic looking for suspicious activity. The Bro framework provides an extensible scripting language that allows an analysis

More information

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache. JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming

More information

FIREWALL AND NAT Lecture 7a

FIREWALL AND NAT Lecture 7a FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security

More information

Improved metrics collection and correlation for the CERN cloud storage test framework

Improved metrics collection and correlation for the CERN cloud storage test framework Improved metrics collection and correlation for the CERN cloud storage test framework September 2013 Author: Carolina Lindqvist Supervisors: Maitane Zotes Seppo Heikkila CERN openlab Summer Student Report

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

CSE543 - Computer and Network Security Module: Firewalls

CSE543 - Computer and Network Security Module: Firewalls CSE543 - Computer and Network Security Module: Firewalls Professor Trent Jaeger Fall 2010 1 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,

More information

Flow Analysis Versus Packet Analysis. What Should You Choose?

Flow Analysis Versus Packet Analysis. What Should You Choose? Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation

More information

CNS-200-1I Basic Administration for Citrix NetScaler 9.0

CNS-200-1I Basic Administration for Citrix NetScaler 9.0 CNS-200-1I Basic Administration for Citrix NetScaler 9.0 This course covers the initial configuration and administration of Citrix NetScaler 9.0. Learners gain an understanding of NetScaler features such

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection

More information

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with

More information

Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,

Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm, Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm, Network IDS devices use passive network monitoring extensively to detect possible threats. Through passive

More information

Comprehensive IP Traffic Monitoring with FTAS System

Comprehensive IP Traffic Monitoring with FTAS System Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous

More information

Basic Internet programming Formalities. Hands-on tools for internet programming

Basic Internet programming Formalities. Hands-on tools for internet programming Welcome Basic Internet programming Formalities Hands-on tools for internet programming DD1335 (gruint10) Serafim Dahl [email protected] DD1335 (Lecture 1) Basic Internet Programming Spring 2010 1 / 23

More information

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process

More information

Enterprise Application Monitoring with

Enterprise Application Monitoring with Enterprise Application Monitoring with 11/10/2007 Presented by James Peel [email protected] / www.altinity.com 1 Who am I? James Peel - [email protected] Job: Managing Director of Altinity

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Network Technologies

Network Technologies Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:

More information

NetFlow/IPFIX Various Thoughts

NetFlow/IPFIX Various Thoughts NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application

More information

RED HAT SOFTWARE COLLECTIONS BRIDGING DEVELOPMENT AGILITY AND PRODUCTION STABILITY

RED HAT SOFTWARE COLLECTIONS BRIDGING DEVELOPMENT AGILITY AND PRODUCTION STABILITY RED HAT S BRIDGING DEVELOPMENT AGILITY AND PRODUCTION STABILITY TECHNOLOGY BRIEF INTRODUCTION BENEFITS Choose the right runtimes for your project with access to the latest stable versions. Preserve application

More information

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

ECE 578 Term Paper Network Security through IP packet Filtering

ECE 578 Term Paper Network Security through IP packet Filtering ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon

More information

What is a Bro log? Justin Azoff. Aug 26, 2014

What is a Bro log? Justin Azoff. Aug 26, 2014 What is a Bro log? Justin Azoff Aug 26, 2014 What is a Bro log? A Bro log is a stream of high level entries that correspond to network events. A file downloaded via HTTP An email sent using SMTP A login

More information

Network Service, Systems and Data Communications Monitoring Policy

Network Service, Systems and Data Communications Monitoring Policy Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring

More information

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of

More information

Cisco IOS Flexible NetFlow Command Reference

Cisco IOS Flexible NetFlow Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT) Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate

More information

Firewalls. Chapter 3

Firewalls. Chapter 3 Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border

More information

Network Agent Quick Start

Network Agent Quick Start Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense

More information

Linux VPS with cpanel. Getting Started Guide

Linux VPS with cpanel. Getting Started Guide Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3

More information

DDoS Protecion Total AnnihilationD. DDoS Mitigation Lab

DDoS Protecion Total AnnihilationD. DDoS Mitigation Lab DDoS Protecion Total AnnihilationD A Industry body formed to foster synergy among stakeholders to promote advancement in DDoS defense knowledge. Independent academic R&D division of Nexusguard building

More information

PAN-OS Syslog Integration

PAN-OS Syslog Integration PAN-OS Syslog Integration Tech Note Revision M 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Log Formats...3 TRAFFIC...3 Descriptions...3 Subtype Field...5 Action Field...6 Flags Field...6

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

OpenFlow Based Load Balancing

OpenFlow Based Load Balancing OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple

More information

CSC574 - Computer and Network Security Module: Firewalls

CSC574 - Computer and Network Security Module: Firewalls CSC574 - Computer and Network Security Module: Firewalls Prof. William Enck Spring 2013 1 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,

More information

Monitoring PostgreSQL database with Verax NMS

Monitoring PostgreSQL database with Verax NMS Monitoring PostgreSQL database with Verax NMS Table of contents Abstract... 3 1. Adding PostgreSQL database to device inventory... 4 2. Adding sensors for PostgreSQL database... 7 3. Adding performance

More information

About This Document 3. Integration and Automation Capabilities 4. Command-Line Interface (CLI) 8. API RPC Protocol 9.

About This Document 3. Integration and Automation Capabilities 4. Command-Line Interface (CLI) 8. API RPC Protocol 9. Parallels Panel Contents About This Document 3 Integration and Automation Capabilities 4 Command-Line Interface (CLI) 8 API RPC Protocol 9 Event Handlers 11 Panel Notifications 13 APS Packages 14 C H A

More information

Instructor: Betty O Neil

Instructor: Betty O Neil Introduction to Web Application Development, for CS437/637 Instructor: Betty O Neil 1 Introduction: Internet vs. World Wide Web Internet is an interconnected network of thousands of networks and millions

More information

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that

More information

Outline Definition of Webserver HTTP Static is no fun Software SSL. Webserver. in a nutshell. Sebastian Hollizeck. June, the 4 th 2013

Outline Definition of Webserver HTTP Static is no fun Software SSL. Webserver. in a nutshell. Sebastian Hollizeck. June, the 4 th 2013 Definition of in a nutshell June, the 4 th 2013 Definition of Definition of Just another definition So what is it now? Example CGI php comparison log-file Definition of a formal definition Aisaprogramthat,usingthe

More information

HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common

More information

CS514: Intermediate Course in Computer Systems

CS514: Intermediate Course in Computer Systems : Intermediate Course in Computer Systems Lecture 7: Sept. 19, 2003 Load Balancing Options Sources Lots of graphics and product description courtesy F5 website (www.f5.com) I believe F5 is market leader

More information

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6? Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6? - and many other vital questions to ask your firewall vendor Zlata Trhulj Agilent Technologies [email protected]

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft Outlook Web

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced

More information

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services Firewalls What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services only authorized traffic is allowed Auditing and

More information