Suricata IDS alert rules for network anomaly detection. These rules are not performance focused. Requires Suricata version 5 or above. Feedback and suggestions welcomed.
-
Notifications
You must be signed in to change notification settings - Fork 41
Suricata rules for network anomaly detection
License
travisbgreen/hunting-rules
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Suricata rules for network anomaly detection