From a practical perspective, these results
confirm that the selection of runtime security tools
should be tailored to the priorities of the organization
and the available infrastructure capacity. In
environments with highly sensitive workloads,
Tetragon's detection speed may be prioritized despite
its higher memory requirements. Conversely, in
resource-constrained infrastructures, Falco's memory
efficiency makes it a more suitable choice. Tracee can
be positioned as an alternative offering a balance,
with a combination of detection capabilities,
observability, and adequate forensic support.
5 CONCLUSION
The comparison results show that Tetragon excels in
detection speed for container escapes and crypto
mining, while Falco is more effective in DoS
detection. All three tools achieved 100% detection
accuracy without false positives, confirming their
reliability. In terms of performance, Tetragon
recorded the lowest CPU usage, Falco showed the
lowest memory usage, and Tracee balanced both with
moderate CPU and memory usage. Importantly, a
comparison between baseline conditions and attacks
shows that active attacks do not significantly increase
resource usage, reflecting the efficiency of the
detection process. These findings suggest that tool
selection should be based on organizational priorities.
Tetragon is suitable for sensitive workloads that
require fast detection, Falco is recommended for
environments with memory constraints, and Tracee
represents a balanced alternative that offers additional
forensic insights.
REFERENCES
Abdillah, Mgs. M. F., Sardi, I. L., & Hadikusuma, A.
(2023). Analisis Performa GetX dan BLoC State
Management Library Pada Flutter untuk Perangkat
Lunak Berbasis Android. LOGIC: Jurnal Penelitian
Informatika, 1(1), 73.
https://doi.org/10.25124/logic.v1i1.6479
Bharadwaj, D., & Premananda, B. S. (2022). Transition of
Cloud Computing from Traditional Applications to the
Cloud Native Approach. 2022 IEEE North Karnataka
Subsection Flagship International Conference.
https://doi.org/10.1109/NKCon56289.2022.10126871
Bhattacharya, M. H., & Mittal, H. K. (2023). Exploring the
Performance of Container Runtimes within Kubernetes
Clusters. International Journal of Computing, 22(4),
509–514. https://doi.org/10.47839/ijc.22.4.3359
Cloud Native Computing Foundation. (2024). CNCF 2023
Annual Survey. https://www.cncf.io/reports/cncf-
annual-survey-2023/
Dresch, A., Daniel, ·, Lacerda, P., Antônio, J., & Antunes,
V. (2015). Design Science Research A Method for
Science and Technology Advancement. Springer
Cham. https://doi.org/https://doi.org/10.1007/978-3-
319-07374-3
ElSahly, O., & Abdelfatah, A. (2022). A Systematic
Review of Traffic Incident Detection Algorithms.
Sustainability, 14(22), 14859.
https://doi.org/10.3390/su142214859
Fadhillah, R. (2024). MONITORING KEAMANAN
RUNTIME PADA KUBERNETES
MENGGUNAKAN.
Goswami, S. S. (2024). Exploring the Impact of Artificial
Intelligence Integration on Cybersecurity: A
Comprehensive Analysis. Journal of Industrial
Intelligence, 2(2), 73–93.
https://doi.org/10.56578/jii020202
Kim, J., & Nam, J. (2024). eBPF-based Container Activity
Analysis System eBPF. The Transactions of the Korea
Information Processing Society, 13(9), 404–412.
https://doi.org/10.3745/TKIPS.2024.13.9.404
Kosinska, J., Balis, B., Konieczny, M., Malawski, M., &
Zielinski, S. (2023). Toward the Observability of
Cloud-Native Applications: The Overview of the State-
of-the-Art. IEEE Access, 11, 73036–73052.
https://doi.org/10.1109/ACCESS.2023.3281860
Magnani, S., Risso, F., & Siracusa, D. (2022). A Control
Plane Enabling Automated and Fully Adaptive
Network Traffic Monitoring With eBPF. IEEE Access,
10, 90778–90791.
https://doi.org/10.1109/ACCESS.2022.3202644
OWASP. (2022). OWASP Kubernetes Top 10.
https://owasp.org/www-project-kubernetes-top-ten/
Purwoko, R., Priambodo, D. F., & Prasetyo, A. N. (2024).
Quantifying of runC, Kata and gVisor in Kubernates.
ILKOM Jurnal Ilmiah, 16(1), 12–26.
https://doi.org/10.33096/ilkom.v16i1.1679.12-26
Red Hat. (2024). The state of Kubernetes security report.
Villegas-Ch, W., Govea, J., Gutierrez, R., Maldonado
Navarro, A., & Mera-Navarrete, A. (2024).
Effectiveness of an Adaptive Deep Learning-Based
Intrusion Detection System. IEEE Access, 12, 184010–
184027.
https://doi.org/10.1109/ACCESS.2024.3512363