Downloads: 122 | Views: 330 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015 | Rating: 6.3 / 10
Intrusion Detection using Security Onion Based on Kill Chain Approach
Beatrice Ssowmiya J [3] | Prabhakaran S
Abstract: Log Management and Intrusion Detection solution have been evolving for years. But, it remains a biggest challenge for every organization of all sizes to meet the operational, audit and security needs using these solutions. A new class of threats, appropriately dubbed the
Keywords: Intrusion detection, kill chain, logs, correlation, intrusion analysis, intelligence, threat, APT, computer network defense, attacks
Edition: Volume 4 Issue 3, March 2015,
Pages: 586 - 589