Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
Loginsoft-Research committed Jun 23, 2023
1 parent 2321165 commit 0f35234
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,10 +2,10 @@
Linux-based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Rego/Sigma

This is an experimental project to evaluate possible ways to detect exploits (CVE) in a Linux environment (HOST/Container/Cloud) using
- `ebpf` based - Falco Runtime Security
- Analytic + Memory based - Osquery + Yara
- Policy based - Rego + OPA/Tracee
- Log based - Sigma
- `ebpf` based - [Falco Runtime Security](https://falco.org/)
- Analytic + Memory based - [Osquery](https://www.osquery.io/) + [Yara](http://virustotal.github.io/yara/)
- Policy based - [Rego + OPA](https://www.openpolicyagent.org/docs/latest/policy-language/)/ [Aquasec-Tracee](https://github.com/aquasecurity/tracee)
- Log based - [Sigma](https://github.com/SigmaHQ/sigma)

We were able to detect the majority of the exploits through `ebpf` or `kprobe` instrumentation by analyzing the syscalls. Both `Falco` and `Rego` approaches worked accurately in Host & Containerized environments. However, there are a few limitations in all of the above approaches, stay tuned - the blog coming out soon.

Expand Down

0 comments on commit 0f35234

Please sign in to comment.