A Deep Analysis of Performance Metrics and Comparative Assessment of Network Telemetry Tools in Linux Environments

Gupta, Prachi (2024) A Deep Analysis of Performance Metrics and Comparative Assessment of Network Telemetry Tools in Linux Environments. Journal of Advances in Mathematics and Computer Science, 39 (6). pp. 80-90. ISSN 2456-9968

[thumbnail of Gupta3962024JAMCS117751.pdf] Text
Gupta3962024JAMCS117751.pdf - Published Version

Download (351kB)


As cyber-attacks targeting public cloud infrastructure increase in severity, it is essential to have strong network security measures for Linux machines. [1] Recent statistics underscore the severity of the situation, with a significant 39% of businesses experiencing security breaches within their cloud environments in 2022. This data shows a notable 35% increase in security attacks from the previous year. These breaches affected around 400 million individuals, emphasizing the urgent need for action.

As organizations increasingly migrate their operations to the cloud, addressing security risks is paramount. This needs a comprehensive approach to cloud security, focusing on monitoring and surveillance of cloud infrastructure usage by customers. Effective security observability requires deploying monitoring and alerting systems capable of promptly detecting and mitigating potential threats in real-time. [2] The Linux community has embraced Berkeley Packet Filter (BPF) technology as a cornerstone in this effort. BPF's flexibility and extensibility have led to the development of sophisticated tools, offering unparalleled capabilities in enhancing security observability and response mechanisms. This study begins by examining legacy solutions like auditd, which help auditing of all aspects of Linux machines. It also explores the origins and evolution of BPF within the Linux ecosystem, highlighting its transformative impact.

The study further delves into BPF-based monitoring tools tailored for scrutinizing Linux system processes. It elucidates their functionalities and meticulously assesses the performance of select tools and technologies. Rigorous experimental method, involving virtual machines with identical specifications subjected to network load simulations, ensures reliable and unbiased performance evaluations. Through this experimentation, valuable insights into resource consumption patterns for each tool are gleaned, aiding informed decision-making in tool selection and deployment strategies.

Item Type: Article
Subjects: Eprints STM archive > Mathematical Science
Depositing User: Unnamed user with email admin@eprints.stmarchive
Date Deposited: 30 May 2024 08:19
Last Modified: 30 May 2024 08:19
URI: http://public.paper4promo.com/id/eprint/1997

Actions (login required)

View Item
View Item