Главная
Study mode:
on
1
Intro
2
The challenges
3
Different approaches
4
Introducing Extended Berkeley Packet Filter (eBPF)
5
How it works
6
Linux kernel diagram
7
How GD is using eBPF
8
Getting started with eBPF
9
eBPF Advantages & Disadvantages
10
Common eBPF use cases
11
eBPF @ Amazon
12
Why eBPF for GuardDuty
13
System Call Tracing with eBPF
14
System Call Tracing - Avoiding Race Conditions
15
Rich Container and Process Context
16
Collected Metadata Kernel and Userspace
17
Monitored Events
18
On-Host Versus Backend Processing
19
Example Scenario Command Injection Exploitation
20
Example Scenario Detections
21
Actionable Detections
22
Summary
Description:
Explore a comprehensive conference talk on leveraging Extended Berkeley Packet Filter (eBPF) to identify suspicious behaviors in Kubernetes environments. Delve into AWS's approach to detecting security risks such as communication with command and control systems, Tor clients, and cryptocurrency miners. Learn about the challenges in securing Kubernetes, various approaches to threat detection, and why AWS chose eBPF over other options. Gain insights into eBPF's functionality, advantages, and disadvantages, as well as common use cases. Discover how AWS implements eBPF in GuardDuty, including system call tracing techniques, rich container and process context collection, and on-host versus backend processing. Examine an example scenario of command injection exploitation and the resulting detections. Conclude with actionable insights for enhancing Kubernetes security using eBPF technology.

Finding the Needles in a Haystack - Identifying Suspicious Behaviors with eBPF

CNCF [Cloud Native Computing Foundation]
Add to list