ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Intrusion Detection using Security Onion Based on Kill Chain Approach

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)

Publication Date:

Authors : ; ;

Page : 586-589

Keywords : Intrusion detection; kill chain; logs; correlation; intrusion analysis; intelligence; threat; APT; computer network defense; attacks;

Source : Downloadexternal Find it from : Google Scholarexternal


Log Management and Intrusion Detection solution have been evolving for years. But, it remains a biggest challenge for every organization of all sizes to meet the operational, audit and security needs using these solutions. A new class of threats, appropriately dubbed the

Last modified: 2021-06-30 21:34:49