Chapter 11. Security
This chapter summarizes the security of BPF and BPF for security analysis, providing various tools that can be helpful for both security and performance observability. You can use these tools to detect intrusions, create whitelists of normal executable and privileged usage, and to enforce policies.
Learning Objectives:
Understand use cases for BPF security
Show new process execution to detect possible malicious software
Show TCP connections and resets to detect possible suspicious activity
Study Linux capability usage to aid the creation of whitelists
Understand other forensic sources, such as shell and console logging
This chapter begins with background on security tasks and then summarizes BPF capabilities, configuring ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access