Suricata is the leading independent open source threat detection engine
Require : MUSL FRAMEWORK MUST BE INSTALLED ON NAS
Qpython39 is required for rules update database
all files are within /opt/Suricata
/opt/Suricata/bin/suricata-update (to update rules)
listen by default on ETH0 (modifiy /opt/Suricata/Suricata.sh for modification)
command line information in txt file /opt/Suricata/usage.txt
logs : /opt/Suricata/var/log/suricata
Suricata is the leading independent open source threat detection engine. By combining intrusion detection (IDS), intrusion prevention (IPS), network security monitoring (NSM) and PCAP processing, Suricata can quickly identify, stop, and assess the most sophisticated attacks.
Always one step ahead
Our community of developers ensures Suricata remains on the cutting edge of threat detection and response. They prioritize security, usability, and efficiency to keep your network safe from sophisticated and emerging threats.
Plays well with others
Suricata integrates seamlessly with your network and can be embedded within numerous respected commercial and open source solutions.
Independence day is every day
The Suricata project and code are owned and supported by the Open Information Security Foundation (OISF), a non-profit that is committed to keeping Suricata open source forever.
TIP ME !!
Your gratitude and finance will help me to continue integration of this QPKG and maintain up to date versions.