Downloads: 120
Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015
Intrusion Detection using Security Onion Based on Kill Chain Approach
Beatrice Ssowmiya J [3] | Prabhakaran S
Abstract: Log Management and Intrusion Detection solution have been evolving for years. But, it remains a biggest challenge for every organization of all sizes to meet the operational, audit and security needs using these solutions. A new class of threats, appropriately dubbed the
Keywords: Intrusion detection, kill chain, logs, correlation, intrusion analysis, intelligence, threat, APT, computer network defense, attacks
Edition: Volume 4 Issue 3, March 2015,
Pages: 586 - 589
Similar Articles with Keyword 'Intrusion detection'
Downloads: 4
Student Project, Information Technology, India, Volume 10 Issue 12, December 2021
Pages: 695 - 698Intrusion Detection using Machine Learning Techniques
Akshay Kaushik | Varun Goel
Downloads: 95
Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 1479 - 1482Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System
Macdonald Mukosera [4] | Thabiso Peter Mpofu [6] | Budwell Masaiti [2]