Intrusion Detection using Security Onion Based on Kill Chain Approach
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122 | Views: 361 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015 | Popularity: 6.3 / 10


     

Intrusion Detection using Security Onion Based on Kill Chain Approach

Beatrice Ssowmiya J, Prabhakaran S


Abstract: Log Management and Intrusion Detection solution have been evolving for years. But, it remains a biggest challenge for every organization of all sizes to meet the operational, audit and security needs using these solutions. A new class of threats, appropriately dubbed the


Keywords: Intrusion detection, kill chain, logs, correlation, intrusion analysis, intelligence, threat, APT, computer network defense, attacks


Edition: Volume 4 Issue 3, March 2015


Pages: 586 - 589



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Beatrice Ssowmiya J, Prabhakaran S, "Intrusion Detection using Security Onion Based on Kill Chain Approach", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 586-589, https://www.ijsr.net/getabstract.php?paperid=SUB152066, DOI: https://www.doi.org/10.21275/SUB152066

Similar Articles

Downloads: 0

Informative Article, Information Technology, India, Volume 11 Issue 3, March 2022

Pages: 1597 - 1600

Real - Time Monitoring and Alerting Systems for Fintech

Ankur Mahida

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 13 Issue 3, March 2024

Pages: 1943 - 1946

Leveraging Machine Learning for Personalization and Security in Content Management Systems

Venkata Sai Swaroop Reddy Nallapa Reddy

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 11 Issue 6, June 2022

Pages: 2040 - 2044

Unlocking the Potential of Logstash, Elasticsearch, and Kibana: A DevOps Approach to Big Data Logging

Nagaraju Islavath

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, United States of America, Volume 10 Issue 3, March 2021

Pages: 2042 - 2053

Digital Privacy in P&C Claims Processing: Balancing Innovation with Regulatory Requirements

Sateesh Reddy Adavelli, Ravi Teja Madhala

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 11 Issue 6, June 2022

Pages: 1381 - 1384

Impact of Online Disease Prediction

Minakshi K. Kanekar, Divya M. Sawant

Share this Article
Top