Suricata IDS alert rules for network anomaly detection. These rules are not performance focused. Requires Suricata version 5 or above. Feedback and suggestions welcomed.
-
Notifications
You must be signed in to change notification settings - Fork 42
Suricata rules for network anomaly detection
License
travisbgreen/hunting-rules
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Suricata rules for network anomaly detection