Chapter 11. Security
This chapter summarizes the security of BPF and BPF for security analysis, providing various tools that can be helpful for both security and performance observability. You can use these tools to detect intrusions, create whitelists of normal executable and privileged usage, and to enforce policies.
Learning Objectives:
Understand use cases for BPF security
Show new process execution to detect possible malicious software
Show TCP connections and resets to detect possible suspicious activity
Study Linux capability usage to aid the creation of whitelists
Understand other forensic sources, such as shell and console logging
This chapter begins with background on security tasks and then summarizes BPF capabilities, configuring ...
Get BPF Performance Tools now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.