International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122 | Views: 328 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015 | Popularity: 6.3 / 10


     

Intrusion Detection using Security Onion Based on Kill Chain Approach

Beatrice Ssowmiya J, Prabhakaran S


Abstract: Log Management and Intrusion Detection solution have been evolving for years. But, it remains a biggest challenge for every organization of all sizes to meet the operational, audit and security needs using these solutions. A new class of threats, appropriately dubbed the


Keywords: Intrusion detection, kill chain, logs, correlation, intrusion analysis, intelligence, threat, APT, computer network defense, attacks


Edition: Volume 4 Issue 3, March 2015


Pages: 586 - 589



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Beatrice Ssowmiya J, Prabhakaran S, "Intrusion Detection using Security Onion Based on Kill Chain Approach", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 586-589, https://www.ijsr.net/getabstract.php?paperid=SUB152066



Similar Articles

Downloads: 0

Research Paper, Information Technology, India, Volume 11 Issue 3, March 2022

Pages: 1650 - 1657

Zero Trust in Healthcare: Building a Secure Future with DevOps

Vishnu Vardhan Reddy Boda

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 959 - 963

Medical Data Security using RSA and Visual Cryptography

Bency Wilson, Jesline Abraham

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 11 Issue 12, December 2022

Pages: 1382 - 1391

Enhancing Business Continuity through Robust Disaster Recovery Planning: Implementing and Refining BCP / DRP to Ensure Operational Resilience

Wasif Khan

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 2, February 2020

Pages: 1953 - 1959

Data Analytics: Data Privacy, Data Ethics, Data Monetization

Kishore Gade

Share this Article



Top