{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:12:14Z","timestamp":1775041934088,"version":"3.50.1"},"reference-count":109,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3226269","type":"journal-article","created":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T20:46:29Z","timestamp":1669927589000},"page":"126370-126393","source":"Crossref","is-referenced-by-count":30,"title":["Extended Berkeley Packet Filter: An Application Perspective"],"prefix":"10.1109","volume":"10","author":[{"given":"Husain","family":"Sharaf","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, College of Engineering and Petroleum, Kuwait University, Kuwait, Kuwait"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0673-7324","authenticated-orcid":false,"given":"Imtiaz","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, College of Engineering and Petroleum, Kuwait University, Kuwait, Kuwait"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6535-4983","authenticated-orcid":false,"given":"Tassos","family":"Dimitriou","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, College of Engineering and Petroleum, Kuwait University, Kuwait, Kuwait"}]}],"member":"263","reference":[{"key":"ref39","author":"systems","year":"2022","journal-title":"Segment Routing"},{"key":"ref38","first-page":"117","article-title":"The design and implementation of open vSwitch","author":"pfaff","year":"2015","journal-title":"Proc 12th USENIX Symp Netw Syst Design Implement (NSDI)"},{"key":"ref33","first-page":"1","article-title":"Network functions virtualisation An introduction, benefits, enablers, challenges and call for action","volume":"48","author":"chiosi","year":"2012","journal-title":"Proc SDN OpenFlow World Congr"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3409963.3410492"},{"key":"ref31","year":"2021","journal-title":"Open Vswitch"},{"key":"ref30","first-page":"402","article-title":"Design and implementation of eBPF-based virtual tap for inter-VM traffic monitoring","author":"hong","year":"2018","journal-title":"Proc 14th Int Conf Netw Service Manage (CNSM)"},{"key":"ref37","first-page":"101","article-title":"Netmap a novel framework for fast packet IO","author":"rizzo","year":"2012","journal-title":"Proc 21st USENIX Secur Symp (USENIX Secur )"},{"key":"ref36","year":"2022","journal-title":"Data-Plane Development Kit"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3055676"},{"key":"ref34","year":"2021","journal-title":"European Telecommunications Standards Institute (ETSI)"},{"key":"ref28","year":"2021","journal-title":"The kernel development community"},{"key":"ref27","article-title":"Linux tracing systems & how they fit together","author":"evans","year":"2017"},{"key":"ref29","first-page":"1","article-title":"eBPFXDP based firewall and packet filtering","author":"deepak","year":"2018","journal-title":"Proc Linux Plumbers Conf"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465290"},{"key":"ref22","article-title":"A flow-based IDS using machine learning in eBPF","author":"bachl","year":"2021","journal-title":"arXiv 2102 09980"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3371038"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103283"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108010"},{"key":"ref101","article-title":"Semantics, verification, and efficient implementations for tristate numbers","author":"vishwanathan","year":"2021","journal-title":"arXiv 2105 05398"},{"key":"ref26","first-page":"54","article-title":"The express data path Fast programmable packet processing in the operating system kernel","author":"hoiland-jorgensen","year":"2018","journal-title":"Proc 14th Int Conf Emerg Netw EXperiments Technol"},{"key":"ref100","first-page":"41","article-title":"Specification and verification in the field Applying formal methods to BPF just-in-time compilers in the Linux kernel","author":"nelson","year":"2020","journal-title":"Proc of USENIX Symp on Operating Systems Design and Implementation (OSDI)"},{"key":"ref25","year":"1990","journal-title":"SunOS 4 1 3 Reference Manual"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872367"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3359993.3366766"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1561\/9781601986276"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3174138"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5880"},{"key":"ref56","author":"bashandy","year":"2018","journal-title":"Topology Independent Fast Reroute using Segment Routing"},{"key":"ref55","first-page":"408","article-title":"Flexible failure detection and fast reroute using eBPF and SRV6","author":"xhonneux","year":"2018","journal-title":"Proc 14th Int Conf Netw Service Manage (CNSM)"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7417124"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft51509.2021.9492571"},{"key":"ref52","article-title":"Prototyping an eBPF-based 5g mobile gateway","author":"parola","year":"2020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281426"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5668"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110798"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2562565"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111061"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8407006"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67425-4_12"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3135535"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2022.3181890"},{"key":"ref45","article-title":"Elf High-performance in-band network measurement","author":"sommers","year":"2021","journal-title":"Proc TMA"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3479241.3486700"},{"key":"ref47","first-page":"1","article-title":"Umon Flexible and fine grained traffic monitoring in open vswitch","author":"wang","year":"2015","journal-title":"Proc 11th ACM Conf Emerg Netw Exp Technol"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob52687.2021.9606378"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107763"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN53031.2021.9665095"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA54903.2022.00188"},{"key":"ref73","first-page":"1","article-title":"Runtime security monitoring with eBPF","author":"fournier","year":"2021","journal-title":"Proc 17th Symp la S&#x00E9;curit&#x00E9; des Technol del&#x2019;Inf et de la Commun (SSTIC)"},{"key":"ref72","article-title":"Linux security modules General security support for the Linux kernel,&#x201D; Linux security modules: General security support for the Linux kernel","author":"wright","year":"2002","journal-title":"Proc Found Intrusion Tolerant Syst [Organically Assured Survivable Inf Syst ]"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3472883.3486976"},{"key":"ref70","article-title":"Efficient audit data collection for Linux","author":"aich","year":"2021"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"ref77","year":"2021","journal-title":"Istio Service Mesh"},{"key":"ref74","article-title":"Operating system stability and security through process homeostasis","author":"somayaji","year":"2002"},{"key":"ref75","year":"2021","journal-title":"Cisco"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet51028.2020.9335808"},{"key":"ref79","article-title":"Combining system visibility and security using eBPF","volume":"2315","author":"deri","year":"2019","journal-title":"Proc 3rd Italian Conf Cyber Secur in CEUR Workshop Proceedings"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3191943"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/DS-RT52167.2021.9576132"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620744"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"key":"ref64","article-title":"Fast publishsubscribe using Linux eBPF","author":"tatarski","year":"2022"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/NAS51552.2021.9605384"},{"key":"ref66","year":"2021","journal-title":"Knative Framework"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273112"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-05553-3"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407041"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.020"},{"key":"ref109","article-title":"Treehouse A case for carbon-aware datacenter software","author":"anderson","year":"2022","journal-title":"arXiv 2201 02120"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.23919\/PEMWN50727.2020.9293081"},{"key":"ref108","article-title":"Past, present and future of computational storage A survey","author":"lukken","year":"2021","journal-title":"arXiv 2112 09691"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472929"},{"key":"ref107","article-title":"A case for a programmable edge storage middleware","author":"frascaria","year":"2021","journal-title":"arXiv 2111 14720"},{"key":"ref93","first-page":"649","article-title":"Efficient memory disaggregation with Infiniswap","author":"gu","year":"2017","journal-title":"Proc 14th USENIX Symp Netw Syst Design Implement (NSDI)"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3477113.3487267"},{"key":"ref92","article-title":"ZCSD: A computational storage device over zoned namespaces (ZNS) SSDs","author":"lukken","year":"2021","journal-title":"arXiv 2112 00142"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108174"},{"key":"ref91","year":"2022","journal-title":"Samsung"},{"key":"ref104","year":"2022","journal-title":"Common Vulnerabilities and Exposures"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165537"},{"key":"ref103","author":"palmiotti","year":"2022","journal-title":"Kernel Pwning With eBPF a Love Story"},{"key":"ref102","article-title":"Femto-containers Devops on microcontrollers with lightweight virtualization & isolation for iot software modules","author":"zandberg","year":"2021","journal-title":"arXiv 2106 12553"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534410"},{"key":"ref99","year":"2022","journal-title":"Embedded trace macrocell architecture specification"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.13"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3563534"},{"key":"ref10","article-title":"Cloud computing security A survey of service-based models","volume":"114","author":"parast","year":"2022","journal-title":"Comput Secur"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2019.00012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3456859.3456863"},{"key":"ref13","article-title":"A survey on metaverse the state-of-the-art, technologies, applications, and challenges","author":"ning","year":"2021","journal-title":"arXiv2111 09673"},{"key":"ref14","first-page":"1","article-title":"The BSD packet filter A new architecture for user-level packet capture","volume":"46","author":"mccanne","year":"1993","journal-title":"Proc USENIX Winter"},{"key":"ref15","year":"2021","journal-title":"eBPF"},{"key":"ref16","author":"findlay","year":"2020","journal-title":"Host-Based Anomaly Detection With Extended BPF"},{"key":"ref82","first-page":"91","article-title":"BPFbox Simple precise process confinement with eBPF","author":"findlay","year":"2020","journal-title":"Proc ACM SIGSAC Conf Cloud Comput Secur Workshop"},{"key":"ref17","article-title":"EBPF-from a programmer&#x2019;s perspective","author":"hedam","year":"2021"},{"key":"ref81","article-title":"BPFContain: Fixing the soft underbelly of container security","author":"findlay","year":"2021","journal-title":"arXiv 2102 06972"},{"key":"ref18","article-title":"Safe and efficient remote application code execution on disaggregated NVM storage with eBPF","author":"kourtis","year":"2020","journal-title":"arXiv 2002 11528"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom49071.2021.9647635"},{"key":"ref19","article-title":"Revisiting swapping in user-space with lightweight threading","author":"zhong","year":"2021","journal-title":"arXiv 2107 13848"},{"key":"ref83","first-page":"1","article-title":"SubDomain parsimonious server security","author":"cowan","year":"2000","journal-title":"Proc 14th Syst Admin Conf (LISA 2000)"},{"key":"ref80","first-page":"1636","author":"b\u2019elair","year":"2021","journal-title":"SNAPPY Program Kernel-Level Policies for Containers hskip 1em plus 0 5em minus 0 4emrelax"},{"key":"ref89","author":"wieren","year":"2019","journal-title":"Signature-based ddos attack mitigation Automated generating rules for extended berkeley packet filter and express data path"},{"key":"ref85","year":"2022","journal-title":"Intel Platform Analysis Technology"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005773"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3017928"},{"key":"ref88","first-page":"693","article-title":"Detecting asymmetric application-layer Denial-of-Service attacks in-flight with FineLame","author":"demoulin","year":"2019","journal-title":"Proc USENIX Annu Tech Conf (USENIX ATC)"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09968265.pdf?arnumber=9968265","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:35:02Z","timestamp":1672083302000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9968265\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":109,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3226269","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}