{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:28:02Z","timestamp":1775179682225,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819744640","type":"print"},{"value":"9789819744657","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-4465-7_15","type":"book-chapter","created":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:01:46Z","timestamp":1720717306000},"page":"209-219","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Integrating Machine Learning Models into\u00a0the\u00a0Linux Kernel: Opportunities and\u00a0Challenges"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9429-8634","authenticated-orcid":false,"given":"Jorge","family":"Gallego-Madrid","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1958-3292","authenticated-orcid":false,"given":"Irene","family":"Bru-Santa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0069-3017","authenticated-orcid":false,"given":"Ramon","family":"Sanchez-Iborra","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5525-1259","authenticated-orcid":false,"given":"Antonio","family":"Skarmeta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,12]]},"reference":[{"key":"15_CR1","unstructured":"Bachl, M., Fabini, J., Zseby, T.: A flow-based IDS using machine learning in eBPF. arXiv preprint arXiv:2102.09980 (2021)"},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Bertrone, M., Miano, S., Risso, F., Tumolo, M.: Accelerating linux security with eBPF iptables. In: Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, pp. 108\u2013110. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3234200.3234228","DOI":"10.1145\/3234200.3234228"},{"issue":"2","key":"15_CR3","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/COMST.2023.3236448","volume":"25","author":"A Boualouache","year":"2023","unstructured":"Boualouache, A., Engel, T.: A survey on machine learning-based misbehavior detection systems for 5g and beyond vehicular networks. IEEE Commun. Surv. Tutor. 25(2), 1128\u20131172 (2023). https:\/\/doi.org\/10.1109\/COMST.2023.3236448","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Chang, H., Kodialam, M., Lakshman, T., Mukherjee, S.: Microservice fingerprinting and classification using machine learning. In: 2019 IEEE 27th International Conference on Network Protocols (ICNP), pp. 1\u201311 (2019). https:\/\/doi.org\/10.1109\/ICNP.2019.8888077","DOI":"10.1109\/ICNP.2019.8888077"},{"key":"15_CR5","unstructured":"Kernel Development Community, T.: Classic BPF vs EBPF - the Linux Kernel documentation. https:\/\/docs.kernel.org\/bpf\/classic_vs_extended.html. Accessed 5 June 2023"},{"key":"15_CR6","unstructured":"Hauser, F., et al.:: A survey on data plane programming with P4: fundamentals, advances, and applied research. J. Netw. Comput. Appl. (2021). http:\/\/arxiv.org\/abs\/2101.10632"},{"key":"15_CR7","unstructured":"Hong, J., Jeong, S., Yoo, J.H., Hong, J.W.K.: Design and implementation of eBPF-based virtual TAP for inter-VM traffic monitoring. In: 1st International Workshop on High-Precision Networks Operations and Control (HiPNet 2018). 14th International Conference on Network and Service Management (CNSM), Italy, pp. 402\u2013407 (2018)"},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"Jadin, M., De\u00a0Coninck, Q., Navarre, L., Schapira, M., Bonaventure, O.: Leveraging EBPF to make TCP path-aware. IEEE Trans. Netw. Service Manag. 1 (2022). https:\/\/doi.org\/10.1109\/TNSM.2022.3174138","DOI":"10.1109\/TNSM.2022.3174138"},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"Kartsakli, E., et al.: Ai-powered edge computing evolution for beyond 5g communication networks. In: 2023 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit), pp. 478\u2013483 (2023). https:\/\/doi.org\/10.1109\/EuCNC\/6GSummit58263.2023.10188371","DOI":"10.1109\/EuCNC\/6GSummit58263.2023.10188371"},{"key":"15_CR10","unstructured":"Kerrisk, M.: BPF-Helpers(7) - Linux Man. https:\/\/man7.org\/linux\/man-pages\/man7\/bpf-helpers.7.html. Accessed 5 June 2023"},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Liu, C., Cai, Z., Wang, B., Tang, Z., Liu, J.: A protocol-independent container network observability analysis system based on eBPF. In: 2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS), pp. 697\u2013702 (2020). https:\/\/doi.org\/10.1109\/ICPADS51040.2020.00099","DOI":"10.1109\/ICPADS51040.2020.00099"},{"key":"15_CR12","unstructured":"McCanne, S., Jacobson, V.: The BSD packet filter: a new architecture for user-level packet capture. In: Proceedings of the USENIX Winter 1993 Conference Proceedings on USENIX Winter 1993 Conference Proceedings (USENIX 1993), p. 2. USENIX Association (1993)"},{"key":"15_CR13","doi-asserted-by":"publisher","unstructured":"Rivera, S., Gurbani, V.K., Lagraa, S., Iannillo, A.K., State, R.: Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES 2020), pp. 1\u201310 (2020). https:\/\/doi.org\/10.1145\/3407023.3407041","DOI":"10.1145\/3407023.3407041"},{"key":"15_CR14","doi-asserted-by":"publisher","unstructured":"Sanchez-Iborra, R., Skarmeta, A.F.: TinyML-enabled frugal smart objects: challenges and opportunities. IEEE Circuits Syst. Mag. 20(3), 4\u201318 (2020). https:\/\/doi.org\/10.1109\/MCAS.2020.3005467","DOI":"10.1109\/MCAS.2020.3005467"},{"key":"15_CR15","unstructured":"Starovoitov, A., Stringer, J., Kerrisk, M.: eBPF Syscall - The Linux Kernel documentation. https:\/\/docs.kernel.org\/userspace-api\/ebpf\/syscall.html. Accessed 5 June 2023"},{"key":"15_CR16","unstructured":"The kernel development community: BPF Maps - The Linux Kernel documentation. https:\/\/docs.kernel.org\/bpf\/maps.html. Accessed 5 June 2023"},{"key":"15_CR17","doi-asserted-by":"publisher","unstructured":"Van Tu, N., Yoo, J.H., Hong, J.W.K.: Measuring end-to-end packet processing time in service function chaining. In: 16th International Conference on Network and Service Management (CNSM), pp.\u00a01\u20139. IEEE (2020). https:\/\/doi.org\/10.23919\/CNSM50824.2020.9269109","DOI":"10.23919\/CNSM50824.2020.9269109"},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Vieira, M.A.M., Castanho, M.S., Pacifico, R.D.G., Santos, E.R.S., Junior, E.P.M.C., Vieira, L.F.M.: Fast packet processing with eBPF and XDP: concepts, code, challenges, and applications. ACM Comput. Surv. 53(1), 1\u201336 (2020). https:\/\/doi.org\/10.1145\/3371038","DOI":"10.1145\/3371038"},{"key":"15_CR19","doi-asserted-by":"publisher","unstructured":"Wallschlager, M., Gulenko, A., Schmidt, F., Acker, A., Kao, O.: Anomaly detection for black box services in edge clouds using packet size distribution. In: IEEE 7th International Conference on Cloud Networking (CloudNet), pp.\u00a01\u20136. IEEE (2018). https:\/\/doi.org\/10.1109\/CloudNet.2018.8549546","DOI":"10.1109\/CloudNet.2018.8549546"},{"key":"15_CR20","doi-asserted-by":"publisher","unstructured":"Wang, S.Y., Chang, J.C.: Design and implementation of an intrusion detection system by using extended BPF in the Linux Kernel. J. Netw. Comput. Appl. 198 (2022). https:\/\/doi.org\/10.1016\/j.jnca.2021.103283","DOI":"10.1016\/j.jnca.2021.103283"},{"key":"15_CR21","unstructured":"Wirtgen, T.: Leveraging eBPF to improve the flexibility of routing protocols : the case for Border Gateway Protocol (BGP). Ph.D. thesis, Universit\u00e9 catholique de Louvain (2019). http:\/\/hdl.handle.net\/2078.1\/thesis:19606"},{"key":"15_CR22","doi-asserted-by":"publisher","unstructured":"Yang, J., Chen, L., Bai, J.: Redis automatic performance tuning based on ebpf. In: 2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), pp. 671\u2013676 (2022). https:\/\/doi.org\/10.1109\/ICMTMA54903.2022.00139","DOI":"10.1109\/ICMTMA54903.2022.00139"},{"key":"15_CR23","doi-asserted-by":"publisher","unstructured":"Zhang, X., Liu, Z., Bai, J.: Linux network situation prediction model based on EBPF and LSTM. In: 2021 16th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), pp. 551\u2013556 (2021). https:\/\/doi.org\/10.1109\/ISKE54062.2021.9755426","DOI":"10.1109\/ISKE54062.2021.9755426"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-4465-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:03:39Z","timestamp":1720717419000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-4465-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819744640","9789819744657"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-4465-7_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Okinawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isyou.biz\/conf\/mobisec23\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}