Downloads: 122
India | Information Technology | Volume 4 Issue 3, March 2015 | Pages: 586 - 589
Intrusion Detection using Security Onion Based on Kill Chain Approach
Abstract: Log Management and Intrusion Detection solution have been evolving for years. But, it remains a biggest challenge for every organization of all sizes to meet the operational, audit and security needs using these solutions. A new class of threats, appropriately dubbed the
Keywords: Intrusion detection, kill chain, logs, correlation, intrusion analysis, intelligence, threat, APT, computer network defense, attacks
How to Cite?: Beatrice Ssowmiya J, Prabhakaran S, "Intrusion Detection using Security Onion Based on Kill Chain Approach", Volume 4 Issue 3, March 2015, International Journal of Science and Research (IJSR), Pages: 586-589, https://www.ijsr.net/getabstract.php?paperid=SUB152066, DOI: https://dx.doi.org/10.21275/SUB152066