International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 120 | Monthly Hits: ⮙1

Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015


Intrusion Detection using Security Onion Based on Kill Chain Approach

Beatrice Ssowmiya J, Prabhakaran S


Abstract: Log Management and Intrusion Detection solution have been evolving for years. But, it remains a biggest challenge for every organization of all sizes to meet the operational, audit and security needs using these solutions. A new class of threats, appropriately dubbed the


Keywords: Intrusion detection, kill chain, logs, correlation, intrusion analysis, intelligence, threat, APT, computer network defense, attacks


Edition: Volume 4 Issue 3, March 2015,


Pages: 586 - 589


How to Cite this Article?

Beatrice Ssowmiya J, Prabhakaran S, "Intrusion Detection using Security Onion Based on Kill Chain Approach", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB152066, Volume 4 Issue 3, March 2015, 586 - 589

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Intrusion detection'

Downloads: 95

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Downloads: 112

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1127 - 1130

Analysis and Data Retrieval by Filtering Packets in High Speed Routers

Indumathi, K. Kumar

Share this Article

Similar Articles with Keyword 'logs'

Downloads: 105

Research Proposals or Synopsis, Information Technology, Namibia, Volume 6 Issue 11, November 2017

Pages: 1316 - 1321

Investigating the Use of Social Media as a Learning and Teaching Tool in Higher Education Institutions of Namibia

Ndasilwohenda Tuyenikelago Ndilinawa, Nomusa Dlodlo, Jude Osakwe

Share this Article

Downloads: 109

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 991 - 996

Survey of Optimized CSP Migration

Kadlag R A, Devikar R N

Share this Article

Similar Articles with Keyword 'correlation'

Downloads: 102

Review Papers, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 1673 - 1675

Cross-Correlation Based Face Recognition Scheme ? A Review

Ranjeet Singh, Mandeep Kaur

Share this Article

Downloads: 109

Research Paper, Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 790 - 797

ICT Integration in Universities in Relation to ICT Challenges and Work Motivation of Lecturers in Zimbabwe

Dr. Elisha Chamunorwa Kujeke, Dr. Thomas Kennedy

Share this Article

Similar Articles with Keyword 'intelligence'

Downloads: 87

Informative Article, Information Technology, Nigeria, Volume 2 Issue 4, April 2013

Pages: 468 - 473

A Superficial Expos of Data Warehousing: An Intrinsic Component of Modern Day Business Intelligence

Oyerinde, O.D, Adekunle, A. Y, Ebiesuwa, O.O

Share this Article

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, Saudi Arabia, Volume 9 Issue 12, December 2020

Pages: 276 - 284

Business Process Intelligence: A Case Study of Request a Ride

Zelal Shearah, Somayah Aljohi, Salma Althebiani, Nedaa Almuallim, Salma Alhag

Share this Article

Similar Articles with Keyword 'threat'

Downloads: 7

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 7

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 369 - 371

Performing Attacks on Radio Frequency and Embedded based Systems

Preeti Rana

Share this Article

Similar Articles with Keyword 'APT'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 10 Issue 10, October 2021

Pages: 1313 - 1318

Automation in Daily Life & It's Impact on Individuals & Society

Hemant Gautam Bodhare

Share this Article

Similar Articles with Keyword 'attacks'

Downloads: 7

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 7

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 369 - 371

Performing Attacks on Radio Frequency and Embedded based Systems

Preeti Rana

Share this Article

Similar Articles with Keyword 'Intrusion'

Downloads: 95

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Downloads: 103

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2734 - 2737

Detection of Outliers Using Hybrid Algorithm on Categorical Datasets

Rachana P. Jakkulwar, Prof. R. A. Fadnavis

Share this Article

Similar Articles with Keyword 'detection'

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 10, October 2021

Pages: 1155 - 1157

Coal Mine Water Level Detection and Reusability

Cilla Mary Mathew

Share this Article

Similar Articles with Keyword 'kill'

Downloads: 324 | Monthly Hits: ⮙1

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 4 | Monthly Hits: ⮙1

Case Studies, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 563 - 567

Online Teaching Excellence: A Case Study of EMC Institute Kishtwar during COVID-19 Lockdown

Dr. Ashaq Hussain

Share this Article

Similar Articles with Keyword 'chain'

Downloads: 50

Research Paper, Information Technology, Kenya, Volume 9 Issue 12, December 2020

Pages: 881 - 889

Factors Determining Adoption of Block Chain in the Insurance Industry: A Case of Kenya

Kanuku Musyoku, Shitanda Douglas, Nganu Margaret

Share this Article

Downloads: 91 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 1087 - 1088

Modern Warehouse Operations Execution Using Mobile Devices

Dhanesh Thatikonda

Share this Article
Top