UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 12 | Issue 10 | October 2025

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 12 Issue 5
May-2025
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2505514


Registration ID:
561998

Page Number

e383-e392

Share This Article


Jetir RMS

Title

Securing the Cloud: Implementing eBPF Subsystem

Abstract

To design and implement a secure home lab environment using a Linux system, demonstrating appropriate skills in system administration and cybersecurity. Cloud computing has changed the way businesses and organizations manage, store and process data. However, changes in cloud environments also present various security challenges, especially in terms of protecting critical data and maintaining system integrity. Originally designed to intercept network packets, the eBPF subsystem has become a powerful, programmable monitoring tool for the Linux kernel system kernel internally implemented, this proposed work aims to demonstrate how eBPF use cloud environment can be secured, provide fine-grained visibility and control over system actions, enforce security measures, detect abnormal activities, and mitigate the attack surface. This function integrates the eBPF subsystem in the cloud architecture, focusing on functional issues such as network security, system traceability, threat detection, etc. We implement and test eBPF-based programs that manage cloud performance, testing network traffic, and show bad behavior in real time. The results show that eBPF can deliver significant security benefits without severe performance penalties, making it an ideal solution for modern cloud environments.

Key Words

eBPF (Extended Berkeley Packet Filter), Cloud Security, Network Security, System Observability, Kernel-Level Security, Real-Time Monitoring, Threat Detection, Security Policies, Cloud Infrastructure, Attack Surface Reduction

Cite This Article

"Securing the Cloud: Implementing eBPF Subsystem", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.12, Issue 5, page no.e383-e392, May-2025, Available :http://www.jetir.org/papers/JETIR2505514.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Securing the Cloud: Implementing eBPF Subsystem", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.12, Issue 5, page no. ppe383-e392, May-2025, Available at : http://www.jetir.org/papers/JETIR2505514.pdf

Publication Details

Published Paper ID: JETIR2505514
Registration ID: 561998
Published In: Volume 12 | Issue 5 | Year May-2025
DOI (Digital Object Identifier): https://doi.org/10.56975/jetir.v12i5.561998
Page No: e383-e392
Country: Nagpur, Maharashtra, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000203

Print This Page

Current Call For Paper

Jetir RMS