Proceedings of the 12th ACM International Conference on Systems and Storage 2019
DOI: 10.1145/3319647.3325842
|View full text |Cite
|
Sign up to set email alerts
|

AI & eBPF based performance anomaly detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…String matching is handled by Snort using a combination of the Boyer-Moore (BM) [32] and Aho-Corasick (AC) [33] algorithms. [34] suggests using AI to identify performance irregularities using eBPF. eBPF is used in [35], [36] and also [37] in order to build countermeasures for DoS assaults.…”
Section: Related Workmentioning
confidence: 99%
“…String matching is handled by Snort using a combination of the Boyer-Moore (BM) [32] and Aho-Corasick (AC) [33] algorithms. [34] suggests using AI to identify performance irregularities using eBPF. eBPF is used in [35], [36] and also [37] in order to build countermeasures for DoS assaults.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, in [11] authors use eBPF to efficiently replace iptables 4 , a well-known firewall and traffic management tool for Linux systems. Additional applications include safeguarding users privacy while using common domain resolution protocols [12], network congestion [13], [14] and fault [15] detection, network traffic mirroring [16], the deployment of mobile gateway for 5G networks [17], identification and performance tuning of a Redis database [18], Intrusion Detection and Prevention System [19], [20], and detection of specific cyberattacks, such as Distributed Denial of Service [21] or Water Torture [22].…”
Section: A Ebpf-based Applications and Approachesmentioning
confidence: 99%
“…Some researcher have already investigated eBPF based IDSs or thought about using ML in eBPF. [2] propose to use AI for detecting performance anomalies with eBPF. However, they only propose a concept and do not provide an evaluation of the benefit of their approach.…”
Section: B Ebpf For a Machine Learning (Ml)-based Intrusion Detection...mentioning
confidence: 99%