Chapter 3. Imposing an Receiver-Controlled Middlebox

This chapter describes how we can use OCALA to leverage the receiver-imposed functionality offered by i3. We describe how to set up a Bro intrusion detection system as well as offer insights into implementing your own middlebox functionality. This chapter is targetted at advanced users.