Finding the Needles in a Haystack - Identifying Suspicious Behaviors with eBPF
CNCF [Cloud Native Computing Foundation] via YouTube
Overview
Syllabus
Intro
The challenges
Different approaches
Introducing Extended Berkeley Packet Filter (eBPF)
How it works
Linux kernel diagram
How GD is using eBPF
Getting started with eBPF
eBPF Advantages & Disadvantages
Common eBPF use cases
eBPF @ Amazon
Why eBPF for GuardDuty
System Call Tracing with eBPF
System Call Tracing - Avoiding Race Conditions
Rich Container and Process Context
Collected Metadata Kernel and Userspace
Monitored Events
On-Host Versus Backend Processing
Example Scenario Command Injection Exploitation
Example Scenario Detections
Actionable Detections
Summary
Taught by
CNCF [Cloud Native Computing Foundation]