With the progressive implementation of digital services over virtualized infrastructures and smart devices, the inspection of network traffic becomes more challenging than ever, because of the difficulty to run legacy cybersecurity tools in novel cloud models and comput- ing paradigms. The main issues concern i) the portability of the service across heterogeneous public and private infrastructures, that usually lack hardware and software acceleration for efficient packet processing, and ii) the difficulty to integrate monolithic appliances in modular and agile containerized environments. In this Chapter, we investigate the usage of the extended Berkeley Packet Filter (eBPF) for effective and efficient packet inspection in virtualized environments. Our preliminary implementation demonstrates that we can achieve the same performance as well-known packet inspection tools, but with far less resource consumption. This motivates further research work to extend the capability of our framework and to integrate it in Kubernetes.

Monitoring Network Flows in Containerized Environments

2022

Abstract

With the progressive implementation of digital services over virtualized infrastructures and smart devices, the inspection of network traffic becomes more challenging than ever, because of the difficulty to run legacy cybersecurity tools in novel cloud models and comput- ing paradigms. The main issues concern i) the portability of the service across heterogeneous public and private infrastructures, that usually lack hardware and software acceleration for efficient packet processing, and ii) the difficulty to integrate monolithic appliances in modular and agile containerized environments. In this Chapter, we investigate the usage of the extended Berkeley Packet Filter (eBPF) for effective and efficient packet inspection in virtualized environments. Our preliminary implementation demonstrates that we can achieve the same performance as well-known packet inspection tools, but with far less resource consumption. This motivates further research work to extend the capability of our framework and to integrate it in Kubernetes.
2022
Istituto di Matematica Applicata e Tecnologie Informatiche - IMATI -
Inglese
J. Kolodziej, M. Repetto and A. Duzha
Cybersecurity of Digital Service Chains: Challenges, Methodologies and Tools
32
55
978-3-031-04036-8
https://link.springer.com/chapter/10.1007/978-3-031-04036-8_2
Springer Nature Switzerland
Basel
SVIZZERA
Sì, ma tipo non specificato
network flow monitoring
cloud computing
eBPF
cloud-native applications
1
02 Contributo in Volume::02.01 Contributo in volume (Capitolo o Saggio)
268
open
Matteo RepettoAlessandro Carrega,
info:eu-repo/semantics/bookPart
   AddreSsing ThReats for virtualIseD services
   ASTRID
   H2020
   786922

   A cybersecurity framework to GUArantee Reliability and trust for Digital service chains
   GUARD
   H2020
   833456
File in questo prodotto:
File Dimensione Formato  
prod_464353-doc_182088.pdf

accesso aperto

Descrizione: Monitoring Network Flows in Containerized Environments
Tipologia: Versione Editoriale (PDF)
Dimensione 446.05 kB
Formato Adobe PDF
446.05 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/444044
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact