2020
DOI: 10.1007/978-3-030-39746-3_47
|View full text |Cite
|
Sign up to set email alerts
|

eBPF/XDP Based Network Traffic Visualization and DoS Mitigation for Intelligent Service Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…The architecture of speed network typically consists of the following components: The Network In Card (NIC), which is a hardware component that connects the computer to the n server. The classification of its speed as bits or bytes is discussed above in Table [58] Sensors 2023, 23, x FOR PEER REVIEW 4 of 25 are 40 Gigabit Ethernet, 100 Gigabit Ethernet, and InfiniBand [22]. A Cisco Report predicted that the internet protocol may cross 4.3 zettabytes in 2023, which is 1879 exabytes higher than 2018 [3].…”
Section: Architecture Of High-speed Networkmentioning
confidence: 99%
“…The architecture of speed network typically consists of the following components: The Network In Card (NIC), which is a hardware component that connects the computer to the n server. The classification of its speed as bits or bytes is discussed above in Table [58] Sensors 2023, 23, x FOR PEER REVIEW 4 of 25 are 40 Gigabit Ethernet, 100 Gigabit Ethernet, and InfiniBand [22]. A Cisco Report predicted that the internet protocol may cross 4.3 zettabytes in 2023, which is 1879 exabytes higher than 2018 [3].…”
Section: Architecture Of High-speed Networkmentioning
confidence: 99%
“…[34] suggests using AI to identify performance irregularities using eBPF. eBPF is used in [35], [36] and also [37] in order to build countermeasures for DoS assaults. They don't make use of ML at all.…”
Section: Related Workmentioning
confidence: 99%
“…BPF extensions have achieved phenomenal adoptions in recent years, including security [36,40,44,45] , storage [30,59,70,76], profiling [2,13,42] and networking [11,31,37,38,43,51,63,69,71,74,77,78]. Recent advances on safe BPF infrastructures and implementations [33,47,48,55,56,61,65,66,75,78] further eliminate the barrier of adoptions.…”
Section: Related Workmentioning
confidence: 99%