dshield-traffic-analysis-using-elk,-(thu,-mar-6th)

Utilizing the Kibana interface, it can occasionally be challenging to locate relevant traffic due to the sheer volume present. The three logs employed for traffic examination include cowrie, webhoneypot, and the firewall logs. Additional alternatives to incorporate into the honeypot are packet capture, netflow, and Zeek.


Leave a Reply

Your email address will not be published. Required fields are marked *

Share This