Suricata – Open Source Next Generation Intrusion Detection and Prevention Engine

Use Netsparker


The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field.

Basically it’s a is a multi-threaded intrusion detection/prevention engine engine available from the Open Information Security Foundation

OISF is part of and funded by the Department of Homeland Security’s Directorate for Science and Technology HOST program (Homeland Open Security Technology), by the the Navy’s Space and Naval Warfare Systems Command (SPAWAR), as well as through the very generous support of the members of the OISF Consortium. More information about the Consortium is available, as well as a list of our current Consortium Members.

The Suricata Engine and the HTP Library are available to use under the GPLv2.

The HTP Library is an HTTP normalizer and parser written by Ivan Ristic of Mod Security fame for the OISF. This integrates and provides very advanced processing of HTTP streams for Suricata. The HTP library is required by the engine, but may also be used independently in a range of applications and tools.

You can download Suricata v0.9 here:

suricata-0.9.0.tar.gz

Or read more here.

Posted in: Countermeasures, Networking Hacking, Security Software

, , , , , , , ,


Latest Posts:


Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.
testssl.sh - Test SSL Security Including Ciphers, Protocols & Detect Flaws testssl.sh – Test SSL Security Including Ciphers, Protocols & Detect Flaws
testssl.sh is a free command line tool to test SSL security, it checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more.
Four Year Old libSSH Bug Leaves Servers Wide Open Four Year Old libssh Bug Leaves Servers Wide Open
A fairly serious 4-year old libssh bug has left servers vulnerable to remote compromise, fortunately, the attack surface isn't that big as neither OpenSSH or the GitHub implementation are affected.
CHIPSEC - Platform Security Assessment Framework CHIPSEC – Platform Security Assessment Framework For Firmware Hacking
CHIPSEC is a platform security assessment framework for PCs including hardware, system firmware (BIOS/UEFI), and platform components for firmware hacking.
How To Recover When Your Website Got Hacked How To Recover When Your Website Got Hacked
The array of easily available Hacking Tools out there now is astounding, combined with self-propagating malware, people often come to me when their website got hacked and they don't know what to do, or even where to start.


3 Responses to Suricata – Open Source Next Generation Intrusion Detection and Prevention Engine

  1. Jim Barnes May 13, 2010 at 5:08 pm #

    I hope that companies will take a serious look at the tools the open source community is creating. My friends in the security world are still surprised at how little the executives know or care to know about the vulnerabilities their systems have. Thanks again for making me aware of another tool. Keep your information coming!

  2. DaFyre May 13, 2010 at 7:54 pm #

    I second that, Jim!

    I have actually tested Suricata a while back. Even in the early stages, it is an impressive product and quite useful! I haven’t switched completely over to their engine, but I’m definitely leaning that way! I currently use Snort as my IPS. I haven’t tested Suricata in a while, so I’m looking forward to trying the next rendition of it!

    See Yas!

  3. NNM May 14, 2010 at 12:28 pm #

    Yea, finally. Personally going to wait a few versions and reviews.

    But to: “surprised at how little the executives know or care to know about the vulnerabilities their systems have.”

    I’m shocked daily by this. They think “hacking” is marginal. They don’t think it’s a threat. They don’t know that it is.

    I see brand new servers get massively attacked within 5 minutes of being online. Automated attacks, but still shows you how widespread this is… It doesn’t always take 1 hacker and 1 specific target. The targets first have to be revealed… But if you are reading this, you know all that already..

    A lot of people will tell you “I don’t need an antivirus or firewall, I only surf pages I know.” ………… Wow – It’s a good decade to be a hacker.