ESX: A Self-Generated Control Policy for Remote Access With SSH Based on eBPF
Cloud systems that provide remote data and computational access through networks face significant security challenges. Secure Shell (SSH) is one of the most popular methods for remote access, but the leakage of login information presents a substantial security threat, enabling attackers to exploit i...
| Published in: | IEEE Access |
|---|---|
| Main Authors: | Yuan Zhong, Pengfei Chen, Huxing Zhang |
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10649557/ |
Similar Items
The impact of using eBPF technology on the performance of networking solutions in a Kubernetes cluster
by: Konrad Miziński, et al.
Published: (2025-06-01)
by: Konrad Miziński, et al.
Published: (2025-06-01)
eBPF-Based Runtime Detection of Semantic DDoS Attacks in Linux Containers
by: S. Remya, et al.
Published: (2025-01-01)
by: S. Remya, et al.
Published: (2025-01-01)
An In-Depth Analysis of eBPF-Based System Security Tools in Cloud-Native Environments
by: Jin Her, et al.
Published: (2025-01-01)
by: Jin Her, et al.
Published: (2025-01-01)
DeSFAM: An Adaptive eBPF and AI-Driven Framework for Securing Cloud Containers in Real Time
by: Sehar Zehra, et al.
Published: (2025-01-01)
by: Sehar Zehra, et al.
Published: (2025-01-01)
Fast traffic processing in multi-tenant 5G environments: A comparative performance evaluation of P4 and eBPF technologies
by: Jorge Gallego-Madrid, et al.
Published: (2024-04-01)
by: Jorge Gallego-Madrid, et al.
Published: (2024-04-01)
Detection of Denial of Service Attack in Cloud Based Kubernetes Using eBPF
by: Amin Sadiq, et al.
Published: (2023-04-01)
by: Amin Sadiq, et al.
Published: (2023-04-01)
iKern: Advanced Intrusion Detection and Prevention at the Kernel Level Using eBPF
by: Hassan Jalil Hadi, et al.
Published: (2024-07-01)
by: Hassan Jalil Hadi, et al.
Published: (2024-07-01)
Optimus: association-based dynamic system call filtering for container attack surface reduction
by: Seungyong Yang, et al.
Published: (2024-03-01)
by: Seungyong Yang, et al.
Published: (2024-03-01)
eBPF: A New Approach to Cloud-Native Observability, Networking and Security for Current (5G) and Future Mobile Networks (6G and Beyond)
by: David Soldani, et al.
Published: (2023-01-01)
by: David Soldani, et al.
Published: (2023-01-01)
Dynamic Load Balancing for Direct Server Return Networks Using eBPF for In-Band Metric Feedback
by: Sahakyan Hovhannes, et al.
Published: (2025-09-01)
by: Sahakyan Hovhannes, et al.
Published: (2025-09-01)
RETRACTED: Express Data Processing on FPGA: Network Interface Cards for Streamlined Software Inspection for Packet Processing
by: Sunkari Pradeep, et al.
Published: (2023-01-01)
by: Sunkari Pradeep, et al.
Published: (2023-01-01)
A Low-Latency Optimization of a Rust-Based Secure Operating System for Embedded Devices
by: Ioana Culic, et al.
Published: (2022-11-01)
by: Ioana Culic, et al.
Published: (2022-11-01)
KubeRosy: A Dynamic System Call Filtering Framework for Containers
by: Jin Her, et al.
Published: (2024-01-01)
by: Jin Her, et al.
Published: (2024-01-01)
Cost optimization model for multi-cloud network based on Kubernetes
by: Ming GAO, et al.
Published: (2023-02-01)
by: Ming GAO, et al.
Published: (2023-02-01)
Cost optimization model for multi-cloud network based on Kubernetes
by: Ming GAO, et al.
Published: (2023-02-01)
by: Ming GAO, et al.
Published: (2023-02-01)
A Fine-Grained Network Congestion Detection Based on Flow Watermarking
by: Lusha Mo, et al.
Published: (2022-08-01)
by: Lusha Mo, et al.
Published: (2022-08-01)
Design of Compact Multiband Microstrip BPF Based on Fractal Open-Ring Configuration
by: Hayder Ahmed, et al.
Published: (2018-08-01)
by: Hayder Ahmed, et al.
Published: (2018-08-01)
Characterization of bromelain enzyme treated Bamboo petung fiber (BPF) for composite reinforcement
by: Rudianto Raharjo, et al.
Published: (2024-06-01)
by: Rudianto Raharjo, et al.
Published: (2024-06-01)
IR and Raman Dual Modality Markers Differentiate among Three <i>bis</i>-Phenols: BPA, BPS, and BPF
by: Kuanglin Chao, et al.
Published: (2024-07-01)
by: Kuanglin Chao, et al.
Published: (2024-07-01)
A Robust Technique for Closed Frequent and High Utility Itemsets Mining: Closed-FHUIM
by: Muhammad Waheed Ashraf, et al.
Published: (2024-01-01)
by: Muhammad Waheed Ashraf, et al.
Published: (2024-01-01)
Perancangan Quadband BPF dengan Komponen Lumpeduntuk Sistem m-BWA
by: Gunawan Wibisono, et al.
Published: (2016-06-01)
by: Gunawan Wibisono, et al.
Published: (2016-06-01)
A Compact Dual-Band BPF Based on Open Loop Resonator for Satellite Communication Applications
by: Ali Salim, et al.
Published: (2018-09-01)
by: Ali Salim, et al.
Published: (2018-09-01)
The Protective Effect of Bergamot Polyphenolic Fraction (BPF) on Chemotherapy-Induced Neuropathic Pain
by: Sara Ilari, et al.
Published: (2021-09-01)
by: Sara Ilari, et al.
Published: (2021-09-01)
Efficient Associate Rules Mining Based on Topology for Items of Transactional Data
by: Bo Li, et al.
Published: (2023-01-01)
by: Bo Li, et al.
Published: (2023-01-01)
A Balanced Quad-Band BPF With Independently Controllable Frequencies and High Selectivity
by: Feng Wei, et al.
Published: (2019-01-01)
by: Feng Wei, et al.
Published: (2019-01-01)
Finding Stable Periodic-Frequent Itemsets in Big Columnar Databases
by: Hong N. Dao, et al.
Published: (2023-01-01)
by: Hong N. Dao, et al.
Published: (2023-01-01)
Protective Role of Bergamot Polyphenolic Fraction (BPF) against Deltamethrin Toxicity in Honeybees (<i>Apis mellifera</i>)
by: Roberto Bava, et al.
Published: (2023-12-01)
by: Roberto Bava, et al.
Published: (2023-12-01)
Design of sub-6 GHz BPF using chained even and odd mode admittance polynomials for 5G C-band applications
by: Francis Emmanuel Chinda, et al.
Published: (2025-03-01)
by: Francis Emmanuel Chinda, et al.
Published: (2025-03-01)
IPHM: Incremental periodic high-utility mining algorithm in dynamic and evolving data environments
by: Huiwu Huang, et al.
Published: (2024-09-01)
by: Huiwu Huang, et al.
Published: (2024-09-01)
AN EFFICIENT ALGORITHM FOR MINING HIGH UTILITY ITEMSETS
by: Nguyen Thi Thanh Thuy*, Nguyen Van Le, Manh Thien Ly
Published: (2024-06-01)
by: Nguyen Thi Thanh Thuy*, Nguyen Van Le, Manh Thien Ly
Published: (2024-06-01)
Multilayered Stub Loaded-SIR for Compact Dual-BPF and Quad-channel Diplexer Design
by: S. L. Ajeel, et al.
Published: (2024-12-01)
by: S. L. Ajeel, et al.
Published: (2024-12-01)
A New Algorithm to Preserve Sensitive Frequents Itemsets (APSFI) in Horizontal or Vertical Database
by: Hussein K. AL-Khafaji, et al.
Published: (2013-06-01)
by: Hussein K. AL-Khafaji, et al.
Published: (2013-06-01)
Right-Hand Side Expanding Algorithm for Maximal Frequent Itemset Mining
by: Yalong Zhang, et al.
Published: (2021-11-01)
by: Yalong Zhang, et al.
Published: (2021-11-01)
Switchless Multi-Octave Tune-All BPF Manifold Using Low-Pass/High-Pass Diplexer Junctions
by: Mohammed R. A. Nasser, et al.
Published: (2024-01-01)
by: Mohammed R. A. Nasser, et al.
Published: (2024-01-01)
Incremental Closed Frequent Itemsets Mining-Based Approach Using Maximal Candidates
by: Mohammed A. Al-Zeiadi, et al.
Published: (2025-01-01)
by: Mohammed A. Al-Zeiadi, et al.
Published: (2025-01-01)
WBIN-Tree: A Single Scan Based Complete, Compact and Abstract Tree for Discovering Rare and Frequent Itemset Using Parallel Technique
by: Shwetha Rai, et al.
Published: (2024-01-01)
by: Shwetha Rai, et al.
Published: (2024-01-01)
Traffic savings through a cac procedure incorporating a fair bandwidth allocation policy for elastic services
by: Michael D. Logothetis, et al.
Published: (2004-12-01)
by: Michael D. Logothetis, et al.
Published: (2004-12-01)
Analysis of Linux OS security tools for packet filtering and processing
by: Dmitrij Melkov, et al.
Published: (2021-08-01)
by: Dmitrij Melkov, et al.
Published: (2021-08-01)
High Scalability Document Clustering Algorithm Based On Top-K Weighted Closed Frequent Itemsets
by: Gede Aditra Pradnyana, et al.
Published: (2021-04-01)
by: Gede Aditra Pradnyana, et al.
Published: (2021-04-01)
TKFIM: Top-K frequent itemset mining technique based on equivalence classes
by: Saood Iqbal, et al.
Published: (2021-03-01)
by: Saood Iqbal, et al.
Published: (2021-03-01)
Similar Items
-
The impact of using eBPF technology on the performance of networking solutions in a Kubernetes cluster
by: Konrad Miziński, et al.
Published: (2025-06-01) -
eBPF-Based Runtime Detection of Semantic DDoS Attacks in Linux Containers
by: S. Remya, et al.
Published: (2025-01-01) -
An In-Depth Analysis of eBPF-Based System Security Tools in Cloud-Native Environments
by: Jin Her, et al.
Published: (2025-01-01) -
DeSFAM: An Adaptive eBPF and AI-Driven Framework for Securing Cloud Containers in Real Time
by: Sehar Zehra, et al.
Published: (2025-01-01) -
Fast traffic processing in multi-tenant 5G environments: A comparative performance evaluation of P4 and eBPF technologies
by: Jorge Gallego-Madrid, et al.
Published: (2024-04-01)
