Intrusion Detection using Security Onion Based on Kill Chain Approach
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)Publication Date: 2015-03-05
Authors : Beatrice Ssowmiya J; Prabhakaran S;
Page : 586-589
Keywords : Intrusion detection; kill chain; logs; correlation; intrusion analysis; intelligence; threat; APT; computer network defense; attacks;
Abstract
Log Management and Intrusion Detection solution have been evolving for years. But, it remains a biggest challenge for every organization of all sizes to meet the operational, audit and security needs using these solutions. A new class of threats, appropriately dubbed the
Other Latest Articles
- Secret Fragment Mosaic Images: A Secure Method for Image Transmission
- A Security Approach for Personalized Web Search Framework
- Confronting a Ganglioglioma: Case Report
- Power Reduction in Sub-Threshold Dual Mode Logic Circuits
- Effect of Salt Stress on Physiological and Biochemical Characteristics in Solanum nigrum L.
Last modified: 2021-06-30 21:34:49