Linux has (free) tools to improve security and detect/remove malware: Lynis,Chkrootkit,Rkhunter,ClamAV,Vuls,LMD,radare2,Yara,ntopng,maltrail,Snort,Suricata... Source: 5 months ago
Monitoring & Active Measures - Exporting firewall events to an external time-series database like I describe above is good to see who is touching your firewall or accessing your web site. Using an Intrusion Detection System / Intrusion Prevention System (IDS/IPS) such as open-source Suricata, which is a free package on pfSense, and deploying file system integrity monitoring, such as the open-source Wazuh on the... Source: 6 months ago
Active Measures - Includes (IDS/IPS) such as open-source Suricata or Snort on pfSense, and File Integrity Monitoring (FIM), such as the commercial Tripwire and dated, open-source Tripwire, or the open-source Wazuh installed on servers. These can be combined into a Security Information and Event Management (SIEM) system like the open-source solution, Security Onion. Wazuh itself has evolved into a SIEM. Source: over 1 year ago
Active measures may include an intrusion detection system / intrusion prevention systems (IDS/IPS) such as open-source Suricata on the firewall, and installing file system integrity monitoring, such as the open-source Wazuh on the exposed server. These are combined in one open-source solution, Security Onion. Source: over 1 year ago
Thanks! Was there something in particular you were wondering about? The built-in IDS/IPS is just Suricata under the hood - https://suricata.io/. Source: over 1 year ago
Using a spare laptop and two WiFi dongles (one for 2.4GHz, one for 5GHz) and use an application called Kismet to Monitor the WiFi channels. This is then backed into Suricata IDPS with some custom rules. Source: almost 2 years ago
Active measures may include an intrusion detection system / intrusion prevention systems (IDS/IPS) such as open-source Suricata on the firewall, and installing file system integrity monitoring, such as the open-source Wazuh on the exposed server. These are combined in one open-source solution, Security Onion. Source: over 2 years ago
I'm really enjoying playing with Zinc. We've been playing with it in house here with Meer (https://github.com/quadrantsec/meer) and ingesting several gigs of Suricata (https://suricata.io) and Sagan (https://github.com/quadrantsec/sagan) logs. Source: over 2 years ago
Maybe suricata is what you're looking for: https://suricata.io/. Source: over 2 years ago
Never heard of Wazuh and Suricata Suricata until today. I'm gonna have to play with those things when I get a chance. Source: over 2 years ago
WAZUH (fork of OSSEC would be my first choice when it comes to Linux based HIDS (host based), and Snort or Suricata if you are looking for NIDS (network based). As well as Lynis for ensuring the setup of the host is as you intended. Source: over 2 years ago
You may take a look at this: https://suricata.io/. Source: over 2 years ago
Do you know an article comparing Suricata to other products?
Suggest a link to a post with product alternatives.
This is an informative page about Suricata. You can review and discuss the product here. The primary details have not been verified within the last quarter, and they might be outdated. If you think we are missing something, please use the means on this page to comment or suggest changes. All reviews and comments are highly encouranged and appreciated as they help everyone in the community to make an informed choice. Please always be kind and objective when evaluating a product and sharing your opinion.