Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1261

Zeek

What is Zeek?

ZeekAn open-source network security monitor (formerly Bro) that turns network traffic into structured, protocol-aware logs and scripts for threat detection.


Zeek, originally written by Vern Paxson at LBNL in 1995 as Bro, is an open-source network security monitor that parses high-volume traffic into structured logs (conn, http, dns, ssl, kerberos, files, etc.) and exposes a powerful event-driven scripting language. Unlike pure signature-based IDS, Zeek emphasizes behavior, baselining, and protocol semantics, which makes it ideal for SOC analytics, incident response, threat hunting, and research. It is deployed at network taps in enterprises, ISPs, and academic networks, and integrates with Suricata, SIEMs, and platforms like Corelight. Operators use Zeek scripts to enrich data, raise notices, and feed downstream detection pipelines.

Examples

  1. 01

    Using Zeek conn.log and ssl.log to detect unusual TLS server names indicative of C2 domain fronting.

  2. 02

    Writing a Zeek script that flags large outbound DNS responses indicative of DNS tunneling.

Frequently asked questions

What is Zeek?

An open-source network security monitor (formerly Bro) that turns network traffic into structured, protocol-aware logs and scripts for threat detection. It belongs to the Defense & Operations category of cybersecurity.

What does Zeek mean?

An open-source network security monitor (formerly Bro) that turns network traffic into structured, protocol-aware logs and scripts for threat detection.

How does Zeek work?

Zeek, originally written by Vern Paxson at LBNL in 1995 as Bro, is an open-source network security monitor that parses high-volume traffic into structured logs (conn, http, dns, ssl, kerberos, files, etc.) and exposes a powerful event-driven scripting language. Unlike pure signature-based IDS, Zeek emphasizes behavior, baselining, and protocol semantics, which makes it ideal for SOC analytics, incident response, threat hunting, and research. It is deployed at network taps in enterprises, ISPs, and academic networks, and integrates with Suricata, SIEMs, and platforms like Corelight. Operators use Zeek scripts to enrich data, raise notices, and feed downstream detection pipelines.

How do you defend against Zeek?

Defences for Zeek typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Zeek?

Common alternative names include: Bro, Zeek NSM, Corelight.

Related terms

See also