SURICATA(8) | System Manager's Manual | SURICATA(8) |
suricata - Next Generation Intrusion Detection and Prevention Tool
suricata [OPTIONS] [BPF FILTER]
suricata is a network Intrusion Detection System (IDS). It is based on rules (and is fully compatible with snort rules) to detect a variety of attacks / probes by searching packet content.
This engine supports Multi-Threading, Automatic Protocol Detection (IP, TCP, UDP, ICMP, HTTP, TLS, FTP and SMB), Gzip Decompression, Fast IP Matching and hardware acceleration on CUDA, OpenCL GPU cards and more.
It supports acquiring packets through AF_PACKET, NFQUEUE, PF_RING, PCAP (live or offline) and more.
To run the engine with default configuration on interface eth0 with signature file "signatiures.rules", run the command as:
% suricata -c suricata.yaml -s signatures.rules -i eth0
suricata was written by the Open Information Security Foundation.
This manual page was written by Pierre Chifflier <pollux@debian.org> and Arturo Borrero Gonzalez <arturo@debian.org> for the Debian project (and may be used by others).
10 Oct 2016 |