Lawrence Berkeley National Lab

DST Software

DST has a rich history of developing software tools. We list some of our legacy software tools on this page. Our recent software list is maintained here.
  • Akenti
    Distributed PKI-based Authorization System
  • Bro: Network Intrusion Detection
    A system for detecting network intruders in real time
  • Colt
    A set of Open Source Libraries for High Performance Scientific and Technical Computing in Java.
  • Firefish
    Peer-to-peer Resource Discovery Framework
  • IceCube Software (very old link)
    Software support for the IceCube Neutrino Detector project
  • IPython
    Python software environment for interactive data analyses
  • NetLogger
    Libraries and tools to support end-to-end monitoring of distributed applications
  • Nux
    A high-throughput XML messaging middleware library
  • PCCE
    Tools to support a persistent space for collaboration among distributed work groups
  • pyGlobus/CogKit
    A Python interface to the Globus toolkit.
  • LBNL Physics-Based Intrusion Detection Bro Modules
    This software contains a set of signatures for use with the Bro Network Security Monitor that analyze communication with a physical system and compare the effects of that communication with a physical simulation of the device. This software was originally applied to analyzing attacks on network-connected equipment that controls various functions within the power grid.
  • LBNL DDoS Detection on Science Networks
    This software is a modular detection tool indended to support for monitoring network logs in order to detect denial of service attacks on “research and education” networks that disambiguates such attacks from sustained, high-volume network flows characteristic of large science projects, and referred to as “elephant flows.”
  • LBNL Stream-Processing Architecture for Real-time Cyber-physical Security (SPARCS)
    This software extracts data from distribution-level phasor measurement units (PMUs) and power quality meters, and stores SCADA captured over the network using the Bro Intrusion Detection System, enables a physically distributed, hierarchical processing of that data, stores the data in one or more databases, and provides both software APIs and a graphical, web-based, front-end for inspection of data. This software ships without the analytics themselves, which are distributed separately.
  • Analytics for Stream-Processing Architecture for Real-time Cyber-physical Security (Analytic-SPARCS)
    Example signatures for the Bro Intrusion Detection System to detect attacks on cyber-physical systems, as well as simulators and example network traces.
  • Identifying Computational Operations Based on Power Measurements
    This software is an approach for leveraging sensitive power measurements to "fingerprint" or infer computation taking place on computing systems, including high-performance computing systems, by examining patterns in power use.
  • LBNL Disruption Tolerant Key Management Monitoring for Stream-Processing Architecture for Real-time Cyber-physical Security (DTKM-SPARCS)
    This software is a set of signatures that monitor the Disruption-Tolerant Key Management protocol developed by PNNL as part of the DOE CEDS program. It leverages both the Bro Network Security Monitor and the LBNL Stream-Processing Architecture for Real-time Cyber-physical Security (SPARCS).
  • Research Network Transfer Performance Predictor (netperf-predict)
    This software containts two sets of analysis routines for predicting the percentage of retransmitted packets on network flows. One directory contains code that applies random forest regression in order to predict the number of retransmitted packets on each flow, operating on timeseries data from the tstat tool, which outputs flow-like data. The second directory also applies a random forest regression and also incorporates a "smoothing" routine that increases accuracy in some situations.
  • pyGridWare
    A Python implementation of WS-Resource Framework
  • SciShare
    A Scalable and Secure Peer-to-Peer Information Sharing Tool
  • Sea
    A staged event architecture communication library
  • SGL
    Reliable and secure multicast protocols for wide-area networks
  • Tigres
    Template-based workflow composition and execution in HPC environment