Downloads: 122
India | Information Technology | Volume 4 Issue 3, March 2015 | Pages: 586 - 589
Intrusion Detection using Security Onion Based on Kill Chain Approach
Abstract: Log Management and Intrusion Detection solution have been evolving for years. But, it remains a biggest challenge for every organization of all sizes to meet the operational, audit and security needs using these solutions. A new class of threats, appropriately dubbed the
Keywords: Intrusion detection, kill chain, logs, correlation, intrusion analysis, intelligence, threat, APT, computer network defense, attacks
Rating submitted successfully!
Received Comments
No approved comments available.