Suricata – Open Source Next Generation Intrusion Detection and Prevention Engine


The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field.

Basically it’s a is a multi-threaded intrusion detection/prevention engine engine available from the Open Information Security Foundation

OISF is part of and funded by the Department of Homeland Security’s Directorate for Science and Technology HOST program (Homeland Open Security Technology), by the the Navy’s Space and Naval Warfare Systems Command (SPAWAR), as well as through the very generous support of the members of the OISF Consortium. More information about the Consortium is available, as well as a list of our current Consortium Members.

The Suricata Engine and the HTP Library are available to use under the GPLv2.

The HTP Library is an HTTP normalizer and parser written by Ivan Ristic of Mod Security fame for the OISF. This integrates and provides very advanced processing of HTTP streams for Suricata. The HTP library is required by the engine, but may also be used independently in a range of applications and tools.

You can download Suricata v0.9 here:

suricata-0.9.0.tar.gz

Or read more here.

Posted in: Countermeasures, Networking Hacking, Security Software

, , , , , , , ,


Latest Posts:


zBang - Privileged Account Threat Detection Tool zBang – Privileged Account Threat Detection Tool
zBang is a risk assessment tool for Privileged Account Threat Detection on a scanned network, organizations & red teams can use it to identify attack vectors
Memhunter - Automated Memory Resident Malware Detection Memhunter – Automated Memory Resident Malware Detection
Memhunter is an Automated Memory Resident Malware Detection tool for the hunting of memory resident malware at scale, improving threat hunter analysis process.
Sandcastle - AWS S3 Bucket Enumeration Tool Sandcastle – AWS S3 Bucket Enumeration Tool
Sandcastle is an Amazon AWS S3 Bucket Enumeration Tool, formerly known as bucketCrawler. The script takes a target's name as the stem argument (e.g. shopify).
Astra - API Automated Security Testing For REST Astra – API Automated Security Testing For REST
Astra is a Python-based tool for API Automated Security Testing, REST API penetration testing is complex due to continuous changes in existing APIs.
Judas DNS - Nameserver DNS Poisoning Attack Tool Judas DNS – Nameserver DNS Poisoning Attack Tool
Judas DNS is a Nameserver DNS Poisoning Attack Tool which functions as a DNS proxy server built to be deployed in place of a taken over nameserver to perform targeted exploitation.
dsniff Download - Tools for Network Auditing & Password Sniffing dsniff Download – Tools for Network Auditing & Password Sniffing
Dsniff download is a collection of tools for network auditing & penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, URLsnarf, and WebSpy passively monitor a network


3 Responses to Suricata – Open Source Next Generation Intrusion Detection and Prevention Engine

  1. Jim Barnes May 13, 2010 at 5:08 pm #

    I hope that companies will take a serious look at the tools the open source community is creating. My friends in the security world are still surprised at how little the executives know or care to know about the vulnerabilities their systems have. Thanks again for making me aware of another tool. Keep your information coming!

  2. DaFyre May 13, 2010 at 7:54 pm #

    I second that, Jim!

    I have actually tested Suricata a while back. Even in the early stages, it is an impressive product and quite useful! I haven’t switched completely over to their engine, but I’m definitely leaning that way! I currently use Snort as my IPS. I haven’t tested Suricata in a while, so I’m looking forward to trying the next rendition of it!

    See Yas!

  3. NNM May 14, 2010 at 12:28 pm #

    Yea, finally. Personally going to wait a few versions and reviews.

    But to: “surprised at how little the executives know or care to know about the vulnerabilities their systems have.”

    I’m shocked daily by this. They think “hacking” is marginal. They don’t think it’s a threat. They don’t know that it is.

    I see brand new servers get massively attacked within 5 minutes of being online. Automated attacks, but still shows you how widespread this is… It doesn’t always take 1 hacker and 1 specific target. The targets first have to be revealed… But if you are reading this, you know all that already..

    A lot of people will tell you “I don’t need an antivirus or firewall, I only surf pages I know.” ………… Wow – It’s a good decade to be a hacker.