Fig. 3From: A flexible approach for cyber threat hunting based on kernel audit recordsReal-time kernel audit log forwardingBack to article page