Malware Analysis and Detection Engineering 2020
DOI: 10.1007/978-1-4842-6193-4_23
|View full text |Cite
|
Sign up to set email alerts
|

IDS/IPS and Snort/Suricata Rule Writing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The port selection is performed directly in the data plane, requiring read/write access to the eBPF maps. Suricata is an open source Network Intrusion Detection System, which generates eBPF programs to filter traffic as early as possible [41]. In addition to parsing packets and checking access control lists, Suricata keeps also track of aggregated traffic statistics using global state.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The port selection is performed directly in the data plane, requiring read/write access to the eBPF maps. Suricata is an open source Network Intrusion Detection System, which generates eBPF programs to filter traffic as early as possible [41]. In addition to parsing packets and checking access control lists, Suricata keeps also track of aggregated traffic statistics using global state.…”
Section: Discussionmentioning
confidence: 99%
“…eBPF programs can be attached in different hooks in the Linux kernel and, among other uses, programmers use eBPF also to define packet processing tasks. eXpress Data Path (XDP) [19] is the hook in the earliest networking driver stage, i.e., before a packet is received by the kernel's network For instance, network and service providers use XDP to implement load balancing [11], security [2], monitoring [18], deep packet inspection [41] and policy enforcement [8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation