For more than a decade now, Bro has successfully bridged the traditional gap between academic research and large-scale production deployment. Much of the functionality now part of the core system originates in experimental research projects, often published at top-tier academic conferences. In the same spirit, we summarize a number of related ongoing research efforts below that we currently pursue at the International Computer Science Institute. Results from these projects may eventually be integrated into the production system. We also collect Bro-related publications on this page. Over the years, Bro has not only been used as a platform for novel detection approaches, but also facilitated numerous more general traffic analysis studies.
Deep packet inspection (DPI) is a crucial tool for protecting networks from emerging and sophisticated attacks. However, it is becoming increasingly difficult to implement DPI effectively due to the rising need for more complex analysis, combined with the relentless growth in the volume of network traffic that these systems must inspect. To address this challenge, future DPI technologies must exploit the power of emerging highly concurrent multi- and many-core platforms. Unfortunately, however, current DPI systems severely limit their use of parallelism by either resorting to coarse-grained load-balancing or restricting their analysis to very simple, hard-coded detectors. In order to fully exploit parallel hardware platforms, in this project we develop a comprehensive approach that introduces parallelism across all stages of the complex DPI pipeline. We investigate application-independent scheduling strategies that take existing DPI analyses and automatically parallelize their processing. We do so by mapping them into a domain-specific intermediary representation that abstracts from specifics of the underlying hardware architecture while providing low-level consistency guarantees. Conceptually, the project’s goal is to virtualize and abstract parallelism as a fundamental primitive, just like how virtual memory abstracts away physical memory size limitations from programmers.
Network intrusion detection systems need to balance between a set of challenges difficult to simultaneously address to their full extent: the complexity of network communication; the need to operate extremely efficiently to achieve line-rate performance; and dealing securely with untrusted input. Our project aims to build an efficient and secure bridge between dealing effectively with these challenges, and offering the high-level abstractions required for describing a security policy. Observing that NIDS implementations share a large degree of functionality, we introduce a new middle-layer into NIDS processing, consisting of two main pieces: first, an abstract machine model that is specifically tailored to the network traffic analysis domain and directly supports the field’s common abstractions and idioms in its instruction set; and second, a compilation strategy for turning programs written for the abstract machine into highly optimized, natively executable code for a given target platform, with performance comparable to manually written C code. As a broader goal, our undertaking provides the security community with a novel architecture that facilitates development and reuse of building blocks commonly required for network traffic analysis.
In earlier work, we developed BinPAC, a “A yacc for generating application protocol parsers”. BinPAC is now part of the Bro distribution. In a current effort, we are developing a significantly extended version, nick-named BinPAC++, that integrates semantic constructs into its protocol grammar language, rather than just syntax. Doing so will allow us to move much of the high-level state-tracking that application-layer analysis requires into BinPAC++ protocol specifications, making them it suitable for reuse across different host applications. Furthermore, the new BinPAC++ compiler now compiles into the instruction of the HILTI abstract machine (see above), and no longer into C++.
This project is currently funded by the National Science Foundation as a part of Award CNS-0831535.
The performance pressures on implementing effective network security monitoring are growing fiercely in multiple dimensions, outpacing improvements in CPU performance. The situation has now become dire with the end of Moore’s Law for single CPUs. In general, hardware vendors now turn to parallel execution–many cores and many threads–to sustain performance growth. But adapting network security monitoring to such parallelism raises a host of challenging issues. This project seeks to develop methodologies for effectively parallelizing in-depth security analysis of network activity. Doing so requires structuring the processing into separate, low-level threads suitable for concurrent execution, for which several key issues must be addressed: forwarding packets only when all relevant threads have finished their vetting; minimizing inter-thread communication in the presence of global analysis algorithms; optimizing memory access patterns for locality; and providing effective performance debugging tools. As a proof-of-concept, we have implemented a multi-threaded Bro version that demonstrates the key concepts developed.
This project was funded by the National Science Foundation as part of Award CNS-0716636. We are now integrating its results into the HILTI abstract machine (see above), which will provide a concurrency model that directly supports the developed approach.
Although there has been much research in developing systems for globally sharing security information, often these approaches are fundamentally limited because their broad scope limits the trust that participants can place in the system. This project instead seeks to reap significantly greater utility by considering a more restricted scope: a system for coordinated security analysis based on exchanging information between a set of sites who have explicitly decided to work with each other. This more limited scope optimizes for the common case that in such an environment the participating sites will usually (but not always) act in a responsible manner. A key focus of the project concerns automating the steps commonly involved in security monitoring and forensic analysis while still keeping an analyst “in the loop” for significant decisions.
This project was currently funded by the National Science Foundation under Award CNS-0716640.
Feel free to contact us for more information about any of these projects.
We are maintaining a bibliography of Bro-related academic publications. If you would like to see your work listed here, please send us the bibliographic information (BibTeX prefered), including a link to a PDF version if available online. We are interested in any work that extends or evaluates Bro, as well as research that uses Bro as a tool.
If you are writing a paper that refers to Bro, please cite the original Bro publication as follows: