Data Ingestion

Logs provide a detailed, chronological record of events which is necessary to investigate security incidents.

Without data flowing in, there is nothing to look at!

Security analysts make use of data from different sources - network traffic logs, host-based data (think of system logs) as well as threat intelligence to triage such security incidents.

PCAP

Understanding and analyzing packet-level evidence in pcap files.

Details

Work in progress.