Practical Attack Detection, Analysis, and Response using Big Data, Semantics, and Kill Chains within the OODA Loop

The traditional approach to using toolsets is to treat them as independent entities - detect an event on a device with one tool, analyze the event and device with a second tool, and finally respond against the device with a third tool. The independent detection, analysis, and response processes are...
By
Brian Nafziger
June 3, 2015

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg