The Bro Network Security Monitor. Broverview

Similar documents
The Bro Network Security Monitor. Broverview. Bro Workshop NCSA, Urbana-Champaign, IL. Bro Workshop 2011

The Open Source Bro IDS Overview and Recent Developments

The Bro Network Security Monitor

The Bro Monitoring Platform

The Bro Monitoring Platform

The Bro Network Intrusion Detection System

The Bro Monitoring Platform

An Overview of the Bro Intrusion Detection System

Flow-level analysis: wireshark and Bro. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis

Monitoring Network Security with the Open-Source Bro NIDS

High-Performance Network Security Monitoring at the Lawrence Berkeley National Lab

A Bro Walk-Through. Robin Sommer International Computer Science Institute & Lawrence Berkeley National Laboratory

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

How to (passively) understand the application layer? Packet Monitoring

Bro at 10 Gps: Current Testing and Plans

Hands-on Network Traffic Analysis Cyber Defense Boot Camp

Introduction. Background

Networks and Security Lab. Network Forensics

Berkley Packet Filters and Open Source Tools. a tranched approach to packet capture analysis at today s network speeds

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

100G Network Monitoring with Bro and Time Machine

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Introduction of Intrusion Detection Systems

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

USE HONEYPOTS TO KNOW YOUR ENEMIES

From traditional to alternative approach to storage and analysis of flow data. Petr Velan, Martin Zadnik

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

The Bro Network Intrusion Detection System

NETWORK SECURITY WITH OPENSOURCE FIREWALL

Flow-based detection of RDP brute-force attacks

Network Monitoring using MMT:

Network Security 2. Module 2 Configure Network Intrusion Detection and Prevention

Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

Attacking the TCP Reassembly Plane of Network Forensics Tools

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Networks & Security Course. Web of Trust and Network Forensics

INTRODUCTION TO FIREWALL SECURITY

Linux Network Security

BEGINNER S GUIDE to. Open Source Intrusion Detection Tools.

CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015

What is a Bro log? Justin Azoff. Aug 26, 2014

Detecting Attacks. Signature-based Intrusion Detection. Signature-based Detection. Signature-based Detection. Problems

cinderella: A Prototype For A Specification-Based NIDS


Cover. White Paper. (nchronos 4.1)

Flow Analysis Versus Packet Analysis. What Should You Choose?

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

The Bro Network Security Monitor

Network Traffic Analysis

Managing Latency in IPS Networks

Configuring Health Monitoring

Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia

Network Forensics Network Traffic Analysis

Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,

Implementing Cisco IOS Network Security

Understanding Slow Start

Configuring Snort as a Firewall on Windows 7 Environment

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Configuring Snort as a Firewall on Windows 7 Environment

Host Discovery with nmap

ZMap. Fast Internet-Wide Scanning and its Security Applications. Zakir Durumeric Eric Wustrow J. Alex Halderman. University of Michigan

Configuration Guide. Websense Web Security Solutions Version 7.8.1

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Configuring Security for FTP Traffic

FortiWeb 5.0, Web Application Firewall Course #251

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

Web Application Firewall

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Web Traffic Capture Butler Street, Suite 200 Pittsburgh, PA (412)

ExtraHop and AppDynamics Deployment Guide

How To Test The Bandwidth Meter For Hyperv On Windows V (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell

DDoS Protecion Total AnnihilationD. DDoS Mitigation Lab

VESZPROG ANTI-MALWARE TEST BATTERY

Linux VPS with cpanel. Getting Started Guide

Network Monitoring Tool to Identify Malware Infected Computers

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining

Missing the Obvious: Network Security Monitoring for ICS

DOSarrest Security Services (DSS) Version 4.0

U06 IT Infrastructure Policy

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

PROFESSIONAL SECURITY SYSTEMS

Application DDoS Mitigation

Securing and Monitoring BYOD Networks using NetFlow

VMware vcenter Log Insight Getting Started Guide

Intrusion Detection Systems

Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M

Basic Administration for Citrix NetScaler 9.0

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop

Transcription:

The Bro Network Security Monitor Broverview

Outline 2

Outline Philosophy and Architecture A framework for network traffic analysis. 2

Outline Philosophy and Architecture A framework for network traffic analysis. History From research to operations. 2

Outline Philosophy and Architecture A framework for network traffic analysis. History From research to operations. Architecture Components, logs, scripts, cluster. 2

What is Bro? 3

What is Bro? Packet Capture 3

What is Bro? Packet Capture Traffic Inspection 3

What is Bro? Packet Capture Traffic Inspection Attack Detection 3

What is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow syslog Log Recording 3

What is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow syslog Log Recording Flexibility Abstraction Data Structures 3

What is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow syslog Log Recording Flexibility Abstraction Data Structures 3

What is Bro? Packet Capture Traffic Inspection Attack Detection NetFlow syslog Log Recording Flexibility Abstraction Data Structures 3

What is Bro? Packet Capture Traffic Inspection Attack Detection Domain-specific Python NetFlow syslog Log Recording Flexibility Abstraction Data Structures 3

What is Bro? Packet Capture Sum is more than the pieces Traffic Inspection Attack Detection Domain-specific Python NetFlow syslog Log Recording Flexibility Abstraction Data Structures 3

Philosophy 4

Philosophy Fundamentally different from other IDS. Reset your idea of an IDS before starting to use Bro. 4

Philosophy Fundamentally different from other IDS. Reset your idea of an IDS before starting to use Bro. Real-time network analysis framework. Primarily an IDS, but many use it for general traffic analysis. 4

Philosophy Fundamentally different from other IDS. Reset your idea of an IDS before starting to use Bro. Real-time network analysis framework. Primarily an IDS, but many use it for general traffic analysis. Policy-neutral at the core. Can accommodate a range of detection approaches. 4

Philosophy Fundamentally different from other IDS. Reset your idea of an IDS before starting to use Bro. Real-time network analysis framework. Primarily an IDS, but many use it for general traffic analysis. Policy-neutral at the core. Can accommodate a range of detection approaches. Highly stateful. Tracks extensive application-layer network state. 4

Philosophy Fundamentally different from other IDS. Reset your idea of an IDS before starting to use Bro. Real-time network analysis framework. Primarily an IDS, but many use it for general traffic analysis. Policy-neutral at the core. Can accommodate a range of detection approaches. Highly stateful. Tracks extensive application-layer network state. Supports forensics. Extensively logs what it sees. 4

Target Audience 5

Target Audience Network-savvy users. Requires understanding of your network. 5

Target Audience Network-savvy users. Requires understanding of your network. Unixy mindset. Command-line based, fully customizable. 5

Target Audience Network-savvy users. Requires understanding of your network. Unixy mindset. Command-line based, fully customizable. Large-scale environments. Effective also with liberal security policies. 5

Bro History 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 Vern writes 1st line of code 6

Bro History 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 Vern writes 1st line of code v0.2 1st CHANGES entry v0.6 RegExps Login analysis v0.7a90 Profiling State Mgmt v0.8ax/0.9ax SSL/SMB STABLE releases BroLite v1.1/v1.2 when Stmt Resource tuning Broccoli DPD v1.5 BroControl Bro SDCI v2.0 New Scripts v2.1 IPv6 Input Framew. v2.2 (beta) File Analysis Summary Stat. LBNL starts using Bro operationally v0.4 HTTP analysis Scan detector IP fragments Linux support v0.7a175/0.8ax Signatures SMTP IPv6 support User manual v1.0 BinPAC IRC/RPC analyzers 64-bit support Sane version numbers v1.4 DHCP/BitTorrent HTTP entities NetFlow Bro Lite Deprecated v0.7a48 Consistent CHANGES 0.8a37 Communication Persistence Namespaces Log Rotation v1.3 Ctor expressions GeoIP Conn Compressor 6

Bro History TRW State Mgmt. Independ. State Host Context Time Machine Enterprise Traffic Bro Cluster Shunt Academic Publications USENIX Paper Stepping Stone Detector Anonymizer Active Mapping Context Signat. BinPAC DPD 2nd Path Autotuning Parallel Prototype Input Framework 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 Vern writes 1st line of code v0.2 1st CHANGES entry v0.6 RegExps Login analysis v0.7a90 Profiling State Mgmt v0.8ax/0.9ax SSL/SMB STABLE releases BroLite v1.1/v1.2 when Stmt Resource tuning Broccoli DPD v1.5 BroControl Bro SDCI v2.0 New Scripts v2.1 IPv6 Input Framew. v2.2 (beta) File Analysis Summary Stat. LBNL starts using Bro operationally v0.4 HTTP analysis Scan detector IP fragments Linux support v0.7a175/0.8ax Signatures SMTP IPv6 support User manual v1.0 BinPAC IRC/RPC analyzers 64-bit support Sane version numbers v1.4 DHCP/BitTorrent HTTP entities NetFlow Bro Lite Deprecated v0.7a48 Consistent CHANGES 0.8a37 Communication Persistence Namespaces Log Rotation v1.3 Ctor expressions GeoIP Conn Compressor 6

Who s Using It? Installations across the US Universities Research Labs Supercomputer Centers Fortune 50 Industry Examples Lawrence Berkeley National Lab Indiana University National Center for Supercomputing Applications National Center for Atmospheric Research... and many more sites Fully integrated into Security Onion Popular security-oriented Linux distribution Recent User Meetings Bro Workshop 2011 at NCSA Bro Exchange 2012 at NCAR Bro Exchange 2013 at NCSA Each attended by about 50-90 operators from from 30-50 organizations 7

Deployment Internet Internal Network 8

Deployment Internet Tap Internal Network Bro 8

Deployment Internet Tap Internal Network Bro Runs on commodity platforms.! Standard PCs & NICs. Supports FreeBSD/Linux/OS X. 8

Creating Visibility with Bro 9

Creating Visibility with Bro > bro -i en0 [... wait...] > cat conn.log 9

Creating Visibility with Bro > bro -i en0 [... wait...] > cat conn.log #fields ts id.orig_h id.orig_p id.resp_h id.resp_p proto service duration 1144876741.1198 192.150.186.169 53115 82.94.237.218 80 tcp http 16.14929 1144876612.6063 192.150.186.169 53090 198.189.255.82 80 tcp http 4.437460 1144876596.5597 192.150.186.169 53051 193.203.227.129 80 tcp http 0.372440 1144876606.7789 192.150.186.169 53082 198.189.255.73 80 tcp http 0.597711 1144876741.4693 192.150.186.169 53116 82.94.237.218 80 tcp http 16.02667 1144876745.6102 192.150.186.169 53117 66.102.7.99 80 tcp http 1.004346 1144876605.6847 192.150.186.169 53075 207.151.118.143 80 tcp http 0.029663 9

Creating Visibility with Bro > bro -i en0 [... wait...] > cat conn.log #fields ts id.orig_h id.orig_p id.resp_h id.resp_p proto service duration 1144876741.1198 192.150.186.169 53115 82.94.237.218 80 tcp http 16.14929 1144876612.6063 192.150.186.169 53090 198.189.255.82 80 tcp http 4.437460 1144876596.5597 192.150.186.169 53051 193.203.227.129 80 tcp http 0.372440 1144876606.7789 192.150.186.169 53082 198.189.255.73 80 tcp http 0.597711 1144876741.4693 192.150.186.169 53116 82.94.237.218 80 tcp http 16.02667 1144876745.6102 192.150.186.169 53117 66.102.7.99 80 tcp http 1.004346 1144876605.6847 192.150.186.169 53075 207.151.118.143 80 tcp http 0.029663 > cat http.log 9

Creating Visibility with Bro > bro -i en0 [... wait...] > cat conn.log #fields ts id.orig_h id.orig_p id.resp_h id.resp_p proto service duration 1144876741.1198 192.150.186.169 53115 82.94.237.218 80 tcp http 16.14929 1144876612.6063 192.150.186.169 53090 198.189.255.82 80 tcp http 4.437460 1144876596.5597 192.150.186.169 53051 193.203.227.129 80 tcp http 0.372440 1144876606.7789 192.150.186.169 53082 198.189.255.73 80 tcp http 0.597711 1144876741.4693 192.150.186.169 53116 82.94.237.218 80 tcp http 16.02667 1144876745.6102 192.150.186.169 53117 66.102.7.99 80 tcp http 1.004346 1144876605.6847 192.150.186.169 53075 207.151.118.143 80 tcp http 0.029663 > cat http.log #fields ts id.orig_h id.orig_p [...] host uri status_code user_agent [...] 1144876741.6335 192.150.186.169 53116 docs.python.org /lib/lib.css 200 Mozilla/5.0 1144876742.1687 192.150.186.169 53116 docs.python.org /icons/previous.png 304 Mozilla/5.0 1144876741.2838 192.150.186.169 53115 docs.python.org /lib/lib.html 200 Mozilla/5.0 1144876742.3337 192.150.186.169 53116 docs.python.org /icons/up.png 304 Mozilla/5.0 1144876742.3337 192.150.186.169 53116 docs.python.org /icons/next.png 304 Mozilla/5.0 1144876742.3337 192.150.186.169 53116 docs.python.org /icons/contents.png 304 Mozilla/5.0 1144876742.3337 192.150.186.169 53116 docs.python.org /icons/modules.png 304 Mozilla/5.0 1144876742.3338 192.150.186.169 53116 docs.python.org /icons/index.png 304 Mozilla/5.0 1144876745.6144 192.150.186.169 53117 www.google.com / 200 Mozilla/5.0 9

Creating Visibility with Bro > bro -i en0 [... wait...] > cat conn.log #fields ts id.orig_h id.orig_p id.resp_h id.resp_p proto service duration 1144876741.1198 192.150.186.169 53115 82.94.237.218 80 tcp http 16.14929 1144876612.6063 192.150.186.169 53090 198.189.255.82 80 tcp http 4.437460 1144876596.5597 192.150.186.169 53051 193.203.227.129 80 tcp http 0.372440 [...] 1144876606.7789 host 192.150.186.169 uri 53082 198.189.255.73 status_code 80 tcp user_agent http 0.597711 [...] 1144876741.4693 docs.python.org 192.150.186.169 /lib/lib.css 53116 82.94.237.218 200 80 tcp Mozilla/5.0 http 16.02667 1144876745.6102 192.150.186.169 53117 66.102.7.99 80 tcp http 1.004346 1144876605.6847 docs.python.org 192.150.186.169 /icons/previous.png 53075 207.151.118.143304 80 tcp Mozilla/5.0 http 0.029663 docs.python.org /lib/lib.html 200 Mozilla/5.0 > cat docs.python.org http.log /icons/up.png 304 Mozilla/5.0 docs.python.org /icons/next.png 304 Mozilla/5.0 #fields ts id.orig_h id.orig_p [...] host uri status_code user_agent [...] 1144876741.6335 docs.python.org 192.150.186.169 53116 /icons/contents.png docs.python.org /lib/lib.css 304 200 Mozilla/5.0 Mozilla/5.0 1144876742.1687 192.150.186.169 53116 docs.python.org /icons/previous.png 304 docs.python.org /icons/modules.png 304 Mozilla/5.0 1144876741.2838 192.150.186.169 53115 docs.python.org /lib/lib.html 200 Mozilla/5.0 1144876742.3337 docs.python.org 192.150.186.169 53116 /icons/index.png docs.python.org /icons/up.png 304 304 Mozilla/5.0 1144876742.3337 192.150.186.169 53116 docs.python.org /icons/next.png 304 Mozilla/5.0 1144876742.3337 www.google.com 192.150.186.169 53116 / docs.python.org /icons/contents.png 200 304 Mozilla/5.0 Mozilla/5.0 1144876742.3337 192.150.186.169 53116 docs.python.org /icons/modules.png 304 Mozilla/5.0 1144876742.3338 192.150.186.169 53116 docs.python.org /icons/index.png 304 Mozilla/5.0 1144876745.6144 192.150.186.169 53117 www.google.com / 200 Mozilla/5.0 9

Architecture Packets Network 10

Architecture Events Protocol Decoding Event Engine Packets Network 10

Architecture Logs Notification Analysis Logic Policy Script Interpreter Events Protocol Decoding Event Engine Packets Network 10

Architecture Logs Notification User Interface Analysis Logic Policy Script Interpreter Events Protocol Decoding Event Engine Packets Network 10

Event Model Web Client 1.2.3.4/4321 Request for /index.html Status OK plus data Web Server 5.6.7.8/80 11

Event Model Web Client 1.2.3.4/4321... Stream of TCP packets Request for /index.html Status OK plus data SYN SYN ACK ACK ACK ACK FIN FIN... Web Server 5.6.7.8/80 11

Event Model Web Client 1.2.3.4/4321... Stream of TCP packets Request for /index.html Status OK plus data SYN SYN ACK ACK ACK ACK FIN FIN... Web Server 5.6.7.8/80 Event connection_established(1.2.3.4/4321 5.6.7.8/80) 11

Event Model Web Client 1.2.3.4/4321... Stream of TCP packets Request for /index.html Status OK plus data SYN SYN ACK ACK ACK ACK FIN FIN... Web Server 5.6.7.8/80 Event connection_established(1.2.3.4/4321 5.6.7.8/80) TCP stream reassembly for originator Event http_request(1.2.3.4/4321 5.6.7.8/80, GET, /index.html ) 11

Event Model Web Client 1.2.3.4/4321... Stream of TCP packets Request for /index.html Status OK plus data SYN SYN ACK ACK ACK ACK FIN FIN... Web Server 5.6.7.8/80 Event connection_established(1.2.3.4/4321 5.6.7.8/80) TCP stream reassembly for originator Event http_request(1.2.3.4/4321 5.6.7.8/80, GET, /index.html ) TCP stream reassembly for responder Event http_reply(1.2.3.4/4321 5.6.7.8/80, 200, OK, data) 11

Event Model Web Client 1.2.3.4/4321... Stream of TCP packets Request for /index.html Status OK plus data SYN SYN ACK ACK ACK ACK FIN FIN... Web Server 5.6.7.8/80 Event connection_established(1.2.3.4/4321 5.6.7.8/80) TCP stream reassembly for originator Event http_request(1.2.3.4/4321 5.6.7.8/80, GET, /index.html ) TCP stream reassembly for responder Event http_reply(1.2.3.4/4321 5.6.7.8/80, 200, OK, data) Event connection_finished(1.2.3.4/4321, 5.6.7.8/80) 11

Script Example: Matching URLs Task: Report all Web requests for files called passwd. 12

Script Example: Matching URLs Task: Report all Web requests for files called passwd. event http_request(c: connection, # Connection. method: string, # HTTP method. original_uri: string, # Requested URL. unescaped_uri: string, # Decoded URL. version: string) # HTTP version. { if ( method == "GET" && unescaped_uri == /.*passwd/ ) NOTICE(...); # Alarm. } 12

Script Example: Scan Detector Task: Count failed connection attempts per source address. Bro Workshop 2011 13

Script Example: Scan Detector Task: Count failed connection attempts per source address. global attempts: table[addr] of count &default=0; event connection_rejected(c: connection) { local source = c$id$orig_h; # Get source address. local n = ++attempts[source]; # Increase counter. if ( n == SOME_THRESHOLD ) # Check for threshold. NOTICE(...); # Alarm. } Bro Workshop 2011 13

Distributed Scripts 14

Distributed Scripts Bro comes with >10,000 lines of script code. Prewritten functionality that s just loaded. 14

Distributed Scripts Bro comes with >10,000 lines of script code. Prewritten functionality that s just loaded. Scripts generate alarms and logs. Amendable to extensive customization and extension. 14

Bro comes with support for... The Bro Network Security Monitor 15

Bro comes with support for... Extract files from HTTP, SMTP, etc. Extract/monitor SSL certificates. Detect malware via Team Cymru's Malware Hash Registry. Report vulnerable software versions on the network. Detect popular web applications. Detect SSH brute-forcing. Notable external scripts: Bro module for Mandiant APT1 report Lucky 13 detector. ICSI SSL notary The Bro Network Security Monitor 15

Bro Ecosystem Internet Tap Internal Network Bro 16

Bro Ecosystem Internet Tap Internal Network Bro Control Output BroControl User Interface 16

Bro Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Control Output BroControl User Interface 16

Bro Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output BroControl User Interface 16

Bro Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output BroControl User Interface Events Bro Client Communication Library Broccoli 16

Bro Ecosystem Internet Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output BroControl User Interface Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby (Broccoli Perl) 16

Bro Ecosystem Time Machine Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output BroControl User Interface Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby (Broccoli Perl) 16

Bro Ecosystem Time Machine Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output bro-aux BinPAC capstats BroControl Events Bro Client Communication Library Broccoli Python BTest tracesummary Broccoli Broccoli Ruby User Interface (Broccoli Perl) 16

Bro Ecosystem Time Machine Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output bro-aux BinPAC capstats BroControl Events Bro Client Communication Library Broccoli Python BTest tracesummary Broccoli Broccoli Ruby User Interface (Broccoli Perl) http:://www.bro-ids.org/download git://git.bro-ids.org 16

Bro Ecosystem Time Machine Bro Distribution bro-2.1.tar.gz Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State Other Bros Control Output bro-aux BTest BinPAC tracesummary capstats BroControl Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) http:://www.bro-ids.org/download git://git.bro-ids.org 16

Bro Cluster Ecosystem Time Machine Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State External Bro Control Output bro-aux BinPAC capstats BroControl Events Bro Client Communication Library Broccoli Python BTest tracesummary Broccoli Broccoli Ruby User Interface (Broccoli Perl) 17

Bro Cluster Ecosystem Time Machine Internet Tap Tap Internal Network Contributed Scripts Functionality Bro Events State External Bro Control Output bro-aux BinPAC capstats BroControl Events Bro Client Communication Library Broccoli Python BTest tracesummary Broccoli Broccoli Ruby User Interface (Broccoli Perl) 17

Bro Cluster Ecosystem Time Machine Internet Tap Tap Internal Network Load- Balancer Contributed Scripts Functionality Bro Events State External Bro Control Output bro-aux BinPAC capstats BroControl Events Bro Client Communication Library Broccoli Python BTest tracesummary Broccoli Broccoli Ruby User Interface (Broccoli Perl) 17

Bro Cluster Ecosystem Time Machine Internet Tap Tap Internal Network Packets Load- Balancer Contributed Scripts Functionality Bro Bro Bro Bro Bro Events State External Bro Control Output bro-aux BTest BinPAC tracesummary capstats BroControl Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) 17

Bro Cluster Ecosystem Time Machine Internet Tap Tap Internal Network Packets Load- Balancer Contributed Scripts Functionality Bro Bro Bro Bro Bro Events State External Bro bro-aux BTest BinPAC tracesummary capstats Control Control Output BroControl Output Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) 17

Bro Cluster Ecosystem Time Machine Internet Tap Tap Internal Network Packets Load- Balancer Frontend Contributed Scripts Functionality Bro Bro Bro Bro Bro Workers Events State External Bro bro-aux BTest BinPAC tracesummary capstats Control Control Output Manager BroControl Output Events Bro Client Communication Library Broccoli Python Broccoli Broccoli Ruby User Interface (Broccoli Perl) 17