Open-source software and its components are widely used in various products, solutions, and applications, even in closed-source. Majority of them are made on Linux or Unix based systems. Netfilter framework is one of the examples. It is used for packet filtering, load-balancing, and many other manipulations with network traffic. Netfilter based packet filter iptables has been most common firewall tool for Linux systems for more than two decades. Successor of iptables – nftables was introduced in 2014. It was designed to overcome various iptables limitations. However, it hasn’t received wide popularity and transition is still ongoing. In recent years researchers and developers around the world are searching for solution to increase performan...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
Tema diplomskog rada je analiza sigurnosti tzv.\ Berkeley Packet Filter sustava unutar Linux jezgre....
The availability of virtualization technologies and cloud models has made possible an effective deco...
Počítačové systémy, ktoré musia poskytovať svoje služby s vysokou dostupnosťou vyžadujú isté bezpečn...
This master's thesis is meant to provide techniques in designing and building a standalone packet fi...
Extended Berkeley Packet Filter (eBPF) is an instruction set and an execution environment inside the...
This thesis is oriented on the subject of advanced filtering operations and network security under L...
Traditional packet-filtering firewalls control network traffic based on pre-defined rules. These rul...
The use of internet has increased over the past years. Many users may not have good intentions. Some...
The extended Berkeley Packet Filter (eBPF) is an in-kernel virtual CPU for packet filtering that has...
The extended Berkeley Packet Filter (eBPF) is a recent technology available in the Linux kernel that...
This report presents the study, design and implementation of a firewall, in particular a major compo...
Nowadays, the traditional security features of a Linux system are centered in iptables, which has be...
Kvalifikācijas darbā tiek apskatīta bezmaksas Netfilter ugunsmūra konfigurēšanas iespējas ar iptable...
In this thesis, we present a content based packet filtering Architecture in Linux using Deterministi...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
Tema diplomskog rada je analiza sigurnosti tzv.\ Berkeley Packet Filter sustava unutar Linux jezgre....
The availability of virtualization technologies and cloud models has made possible an effective deco...
Počítačové systémy, ktoré musia poskytovať svoje služby s vysokou dostupnosťou vyžadujú isté bezpečn...
This master's thesis is meant to provide techniques in designing and building a standalone packet fi...
Extended Berkeley Packet Filter (eBPF) is an instruction set and an execution environment inside the...
This thesis is oriented on the subject of advanced filtering operations and network security under L...
Traditional packet-filtering firewalls control network traffic based on pre-defined rules. These rul...
The use of internet has increased over the past years. Many users may not have good intentions. Some...
The extended Berkeley Packet Filter (eBPF) is an in-kernel virtual CPU for packet filtering that has...
The extended Berkeley Packet Filter (eBPF) is a recent technology available in the Linux kernel that...
This report presents the study, design and implementation of a firewall, in particular a major compo...
Nowadays, the traditional security features of a Linux system are centered in iptables, which has be...
Kvalifikācijas darbā tiek apskatīta bezmaksas Netfilter ugunsmūra konfigurēšanas iespējas ar iptable...
In this thesis, we present a content based packet filtering Architecture in Linux using Deterministi...
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express ...
Tema diplomskog rada je analiza sigurnosti tzv.\ Berkeley Packet Filter sustava unutar Linux jezgre....
The availability of virtualization technologies and cloud models has made possible an effective deco...