Zeek Log Reconnaissance with Network Graphs Using Maltego Casefile

Cyber defenders face a relentless barrage of network telemetry, in terms of volume, velocity, and variety. One of the most prolific types of telemetry are Zeek (formerly known as Bro) logs. Many needle-in-a-haystack approaches to threat discovery that rely on log examination are resource-intensive...
By
Ricky Tan
September 21, 2020

All papers are copyrighted. No re-posting of papers is permitted

470x382_Research_Paper_gray.jpg