More

None
Learn more · Tip: Twiddle tags like “~tag” are visible only to you.
 
Select to receive email on updates to reviews and comments.
Review preference

Submitted

The authors still have time to make changes.

eBPF maps are powerful enough to express any type of configuration and runtime information for packet processing engines. However, DDoS protection applications may step behind usual usecases, and corner cases of algorithms in the eBPF maps appear more often and strike harder.

Aggressive insertions into maps, exhaustion of preallocated space, and races - typical situations during an incoming DDoS attack. In this talk, we will cover additions that we had to make for the eBPF maps to make them more scalable under attacks and to drop malicious traffic more effectively, and additions that help us monitor situations better and avoid possible degradations.

Authors
Hidden for blind review
Submission Type
Talk
Submission Label
Nuts and Bolts
Estimated Length Of Time For Presentation (in minutes)
45
Attendance
Physically

OveMerRevExp
Review #9AFlorian Westphal 132
ReviewKuniyuki Iwashima 132
ReviewCong Wang 153
ReviewMartin KaFai Lau 143
Review (not started)Alex Duyck 2

[Edit review] Edit your review[Assign] External reviews[Add comment] Add comment