Loading

Malicious Event Detection Using ELK Stack Through Cyber Threat Intelligence
M Harikanth1, P Rajarajeswari2

1M Harikanth, M Tech Student, Department of CSE, Koneru Lakshmaiah Education Foundation, Guntur (A.P.), India.
2Dr P Rajarajeswari, Associate Professor, Department of CSE, Koneru Lakshmaiah Education Foundation, Guntur (A.P.), India.
Manuscript received on 05 May 2019 | Revised Manuscript received on 12 May 2019 | Manuscript published on 30 May 2019 | PP: 882-886 | Volume-8 Issue-7, May 2019 | Retrieval Number: G6018058719/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the modern world the main objective of any system is to keep their network or system Threat free. It’s not an easy one to ensure security in this threat progressing cyber world. So, many things are going on to get an solution to this everlasting issue. Threat intelligence is used to solve this cyber threat to a maximum extent. The proposed system describes an environment that will check whether the operations are going good in an organization or not in a real time. For an large organization with large capital it is easy to afford the customized tools that are available in the market. But it is not the same with the small ones. The proposed system is more practical, and any small organization can afford this solution to detect most of the malicious operation that are going on their environment either local or remote. A threat intelligence interface, the proposed system will detect and prioritize the threats that are going on the network at a particular point of time. 
Keyword: Small organization, Environment, Customized
Scope of the Article: Cyber-Physical Systems