Practical Attack Detection, Analysis, and Response using Big Data, Semantics, and Kill Chains within the OODA Loop
The traditional approach to using toolsets is to treat them as independent entities - detect an event on a device with one tool, analyze the event and device with a second tool, and finally respond against the device with a third tool. The independent detection, analysis, and response processes are...