You are currently on the new version of our website. Access the old version .

2 Results Found

  • Article
  • Open Access
6 Citations
3,714 Views
19 Pages

The use of Elastic Stack (ELK) solutions and Knowledge Graphs (KGs) has attracted a lot of attention lately, with promises of vastly improving business performance based on new business insights and better decisions. This allows organizations not onl...

  • Article
  • Open Access
416 Views
22 Pages

A Comparative Evaluation of Snort and Suricata for Detecting Data Exfiltration Tunnels in Cloud Environments

  • Mahmoud H. Qutqut,
  • Ali Ahmed,
  • Mustafa K. Taqi,
  • Jordan Abimanyu,
  • Erika Thea Ajes and
  • Fatima Alhaj

Data exfiltration poses a major cybersecurity challenge because it involves the unauthorized transfer of sensitive information. Intrusion Detection Systems (IDSs) are vital security controls in identifying such attacks; however, their effectiveness i...