Evaluating eBPF as an Alternative to Virtual Machine Introspection for High-Interaction Honeypot Implementation
Resumo
Virtual machine introspection (VMI) has been widely used for stealthy monitoring of guest systems. However, context switching between monitoring system and monitored target introduces considerable overhead, especially for tracing common system calls, and deployment of VMI-based setups is complex. This work investigates whether extended Berkeley Packet Filter (eBPF) based tracing, a low-overhead kernel-level monitoring technique, can serve as an alternative. We compare the two paradigms in terms of performance, stealthiness, and practical applicability. Using micro-benchmarks and a prototype high-interaction SSH honeypot, we evaluate the capabilities and limitations of eBPF-based monitoring in adversarial settings. Our results highlight advantages and limitations of both, providing insights for the design of future security monitoring systems.
Publicado
27/10/2025
Como Citar
NUUTINEN, Niku Waltteri Saulinpoika; FAÍSCO, Miguel; PETRUSIC, Milan; MEDEIROS, Ibéria; REISER, Hans P..
Evaluating eBPF as an Alternative to Virtual Machine Introspection for High-Interaction Honeypot Implementation. In: LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 14. , 2025, Valparaíso/Chile.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2025
.
p. 238-254.
