Runtime threat detection monitors the behaviour of running workloads for signs of compromise. Unexpected process spawns, unusual system calls, network connections to new destinations, file writes in sensitive directories, and privilege escalation attempts. Unlike static analysis or pre-deployment controls, runtime detection operates on what workloads actually do, not on what they are configured to do.
Modern runtime detection tools use eBPF (extended Berkeley Packet Filter), a Linux kernel technology that safely runs monitoring code inside the kernel, observing every system call with minimal overhead. Falco, Tetragon, and similar tools are built on eBPF and can instrument all container activity on a node without modifying the containers themselves.
Alert fatigue is the primary operational challenge in runtime threat detection. A busy container generates millions of system calls per minute, only a tiny fraction are security-relevant. Effective detection requires investing in rule tuning, suppressing known-safe baseline patterns, and focusing alerts on high-confidence signals that represent real threats rather than normal operation.