Downloads: 122 | Views: 328 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015 | Popularity: 6.3 / 10
Intrusion Detection using Security Onion Based on Kill Chain Approach
Beatrice Ssowmiya J, Prabhakaran S
Abstract: Log Management and Intrusion Detection solution have been evolving for years. But, it remains a biggest challenge for every organization of all sizes to meet the operational, audit and security needs using these solutions. A new class of threats, appropriately dubbed the
Keywords: Intrusion detection, kill chain, logs, correlation, intrusion analysis, intelligence, threat, APT, computer network defense, attacks
Edition: Volume 4 Issue 3, March 2015
Pages: 586 - 589
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Information Technology, India, Volume 11 Issue 3, March 2022
Pages: 1650 - 1657Zero Trust in Healthcare: Building a Secure Future with DevOps
Vishnu Vardhan Reddy Boda
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Information Technology, India, Volume 11 Issue 10, October 2022
Pages: 959 - 963Medical Data Security using RSA and Visual Cryptography
Bency Wilson, Jesline Abraham
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020
Pages: 1850 - 1857Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms
Jeevan Manda
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 11 Issue 12, December 2022
Pages: 1382 - 1391Enhancing Business Continuity through Robust Disaster Recovery Planning: Implementing and Refining BCP / DRP to Ensure Operational Resilience
Wasif Khan
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 9 Issue 2, February 2020
Pages: 1953 - 1959Data Analytics: Data Privacy, Data Ethics, Data Monetization
Kishore Gade