BPF+: Exploiting Global Data-flow Optimization in a Generalized Packet Filter Architecture Logo

BPF+: Exploiting Global Data-flow Optimization in a Generalized Packet Filter Architecture

0
Free
Visit Website

BPF+ is a generalized packet filter framework that achieves both high-level expressiveness and good performance by compiling a high-level language into a highly efficient native implementation. It uses a novel optimization technique called "redundant predicate elimination" to minimize computation by exploiting semantic redundancies across multiple, independent filters. BPF+ derives from the BSD packet filter (BPF) and includes a filter program translator, a byte code optimizer, a byte code safety verifier, and a just-in-time assembler to convert byte codes to efficient native code. It provides a programmable selection criterion for classifying or selecting packets from a packet stream in a generic, reusable fashion, making it suitable for applications like network monitoring and intrusion detection that require both flexibility and high performance. BPF+ has been shown to achieve performance comparable to state-of-the-art packet filter architectures and better than hand-coded filters written in C.

FEATURES

ALTERNATIVES

A comprehensive cheat sheet for accessing Windows systems from Linux hosts using smbclient and rpcclient tools, covering password management, user and group enumeration, and more.

A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.

SecTemplates offers free, comprehensive security program templates and resources for infosec professionals and startups lacking dedicated security teams.

A behavior-based malware detection system for Android platforms that uses crowdsourcing to detect anomalies and malware in applications.

A quick reference guide for the VI editor, covering commands and modes.

A Microsoft framework for secure and efficient sharing of cybersecurity information between trusted parties to reduce cybersecurity risks.

A comprehensive guide for computer security incident handling, providing guidelines for establishing incident response capabilities and handling incidents efficiently and effectively.

A comprehensive Windows command-line reference guide for security professionals, system administrators, and incident responders.

PINNED