Network-based Intrusion Detection System (NIDS)
NIDS monitors traffic across a network by identifying known patterns of suspicious activity. They inspect both sides of network communications and, in IPS mode, can block malicious traffic when a threat is detected.
Typically, NIDS is connected to the network through a SPAN/mirror port or a network tap, allowing them to capture and analyze traffic without affecting network operations (e.g.: Snort, Suricata).
Host-based Intrusion Detection System (HIDS)
HIDS agent is installed on a host device (a server or workstation) to monitor and report system activities, application logs, and system calls.
It focuses on monitoring the device’s internal behaviour such as running processes and events, Registry settings and Network traffic (e.g.: OSSEC , Tripwire).
Suricata can be installed on OS X, Linux and Windows .
It can be downloaded from its official web site: https://suricata.io/download/ Suricata can be configured to operate in two different modes.
We will be using an Ubuntu server (latest version).
To install Suricata we must first add the official OISF repository by this commands:
Suricata rules
Custom rules can be created and added to the Suricata configuration. Rules Examples;
Before running Suricata, we can execute the configuration file in the test environment to verify whether it detects the correct interface, utilizes the rules, generates .json logs, and so on.