YoVDO

Paint the Picture - Detecting Suspicious Data Patterns in Encrypted Traffic with eBPF and KTLS

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

eBPF Courses Network Monitoring Courses Kubernetes Security Courses Cloud-Native Security Courses Tetragon Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for detecting suspicious data patterns in encrypted traffic using eBPF and KTLS in this informative conference talk. Discover how leveraging in-kernel HTTP visibility and kTLS enables comprehensive security monitoring of sensitive data flows between Kubernetes workloads, even when encrypted. Learn about Tetragon's application of eBPF to decrypt TLS traffic using kTLS, and understand how Security Teams can identify sensitive data patterns like social security numbers or exploit signatures in encrypted L7 traffic. Gain insights into this innovative solution that avoids operational complexity and overhead while remaining fully transparent to applications and CNI. Delve into the growing importance of eBPF in detecting malicious events in Cloud Native environments, and explore its capabilities in monitoring suspicious runtime execution, network connections, and file access.

Syllabus

Paint the Picture! - Detecting Suspicious Data Patterns in E... Natalia Reka Ivanko & John Fastabend


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Tetragon: A Kubernetes Observability and Security Tool
Linux Foundation via YouTube
Introduction to Tetragon - CNCF Security Tool
CNCF [Cloud Native Computing Foundation] via YouTube
eBPF for Observability: The Good, the Bad, and the Ugly
CNCF [Cloud Native Computing Foundation] via YouTube
Combining Confidential Computing and Cloud Native Security
CNCF [Cloud Native Computing Foundation] via YouTube
Securing the Superpowers: Who Loaded That eBPF Program?
CNCF [Cloud Native Computing Foundation] via YouTube