Suricata – Open Source Next Generation Intrusion Detection and Prevention Engine


The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field.

Basically it’s a is a multi-threaded intrusion detection/prevention engine engine available from the Open Information Security Foundation

OISF is part of and funded by the Department of Homeland Security’s Directorate for Science and Technology HOST program (Homeland Open Security Technology), by the the Navy’s Space and Naval Warfare Systems Command (SPAWAR), as well as through the very generous support of the members of the OISF Consortium. More information about the Consortium is available, as well as a list of our current Consortium Members.

The Suricata Engine and the HTP Library are available to use under the GPLv2.

The HTP Library is an HTTP normalizer and parser written by Ivan Ristic of Mod Security fame for the OISF. This integrates and provides very advanced processing of HTTP streams for Suricata. The HTP library is required by the engine, but may also be used independently in a range of applications and tools.

You can download Suricata v0.9 here:

suricata-0.9.0.tar.gz

Or read more here.

Posted in: Countermeasures, Networking Hacking Tools, Security Software

, , , , , , , ,


Latest Posts:


Socialscan - Command-Line Tool To Check For Email And Social Media Username Usage Socialscan – Command-Line Tool To Check For Email And Social Media Username Usage
socialscan is an accurate command-line tool to check For email and social media username usage on online platforms, given an email address or username,
CFRipper - CloudFormation Security Scanning & Audit Tool CFRipper – CloudFormation Security Scanning & Audit Tool
CFRipper is a Python-based Library and CLI security analyzer that functions as an AWS CloudFormation security scanning and audit tool
CredNinja - Test Credential Validity of Dumped Credentials or Hashes CredNinja – Test Credential Validity of Dumped Credentials or Hashes
CredNinja is a tool to quickly test credential validity of dumped credentials (or hashes) across an entire network or domain very efficiently.
assetfinder - Find Related Domains and Subdomains assetfinder – Find Related Domains and Subdomains
assetfinder is a Go-based tool to find related domains and subdomains that are related to a given domain from a variety of sources including Facebook and more.
Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.


3 Responses to Suricata – Open Source Next Generation Intrusion Detection and Prevention Engine

  1. Jim Barnes May 13, 2010 at 5:08 pm #

    I hope that companies will take a serious look at the tools the open source community is creating. My friends in the security world are still surprised at how little the executives know or care to know about the vulnerabilities their systems have. Thanks again for making me aware of another tool. Keep your information coming!

  2. DaFyre May 13, 2010 at 7:54 pm #

    I second that, Jim!

    I have actually tested Suricata a while back. Even in the early stages, it is an impressive product and quite useful! I haven’t switched completely over to their engine, but I’m definitely leaning that way! I currently use Snort as my IPS. I haven’t tested Suricata in a while, so I’m looking forward to trying the next rendition of it!

    See Yas!

  3. NNM May 14, 2010 at 12:28 pm #

    Yea, finally. Personally going to wait a few versions and reviews.

    But to: “surprised at how little the executives know or care to know about the vulnerabilities their systems have.”

    I’m shocked daily by this. They think “hacking” is marginal. They don’t think it’s a threat. They don’t know that it is.

    I see brand new servers get massively attacked within 5 minutes of being online. Automated attacks, but still shows you how widespread this is… It doesn’t always take 1 hacker and 1 specific target. The targets first have to be revealed… But if you are reading this, you know all that already..

    A lot of people will tell you “I don’t need an antivirus or firewall, I only surf pages I know.” ………… Wow – It’s a good decade to be a hacker.