Experimental Ebpf Firewall in Rust with Heuristic Risk Scoring
Mood
informative
Sentiment
positive
Category
startup_launch
Key topics
What it currently does
Rust + eBPF (XDP) packet inspection
Per-IP risk scoring (0–1000)
Detects:
Port scans: SYN/FIN/NULL/XMAS
TTL variance (possible spoofing)
Burst traffic patterns (DoS-like)
ICMP misuse and oversized payloads
Malformed packets
Bloom filter blocklist (up to 400k entries)
LRU map tracking port access timing
Auto-blocking on critical risk
Tarpit behavior on high-risk IPs
Why I built it
I wanted to learn:
Rust in kernel-level constraints
How XDP works internally
Practical heuristics for lightweight threat detection
Efficient state tracking inside eBPF maps
What it is NOT
Not production-ready
Not a malware scanner
Not a Suricata/Snort alternative
Looking for feedback
Particularly interested in:
Map design improvements
Heuristic tuning
Performance considerations
Ideas to avoid false positives
Discussion Activity
No activity data yet
We're still syncing comments from Hacker News.
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
Discussion hasn't started yet.
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.