Talk With an Expert

Detecting and Preventing Attacks Earlier in the Kill Chain

Detecting and Preventing Attacks Earlier in the Kill Chain (PDF, 3.23MB)Published: 31 Aug, 2015
Created by
Chris Velazquez

Most organizations place a strong focus on intrusion prevention technologies and not enough effort into detective technologies. Prevention of malicious attacks is ideal, but detection is mandatory in combatting cyber threats. Security vendors will only provide blocking signatures when there is a near zero false-positive rate. Because of this, there are signatures that are not implemented resulting in false-negatives from one's security devices. This paper provides a look at tools that can be used to improve the detection of attackers at every phase of their attack. The intelligence learned from these attacks allows one to defend against these known attack vectors. This paper will look at a variety of open-source network IDS capabilities and other analysis tools to look at preventing and detecting attacks earlier in the cyber kill chain.

Detecting and Preventing Attacks Earlier in the Kill Chain