{"id":1461,"date":"2024-01-26T07:42:14","date_gmt":"2024-01-26T07:42:14","guid":{"rendered":"\/cybersecurity-blog\/?p=1461"},"modified":"2025-07-07T16:18:25","modified_gmt":"2025-07-07T16:18:25","slug":"detection-with-suricata-ids","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/","title":{"rendered":"Detection with Suricata IDS"},"content":{"rendered":"\n<p>Editor\u2019s note: The current article was originally published on May 13, 2021, and updated on January 26, 2024.&nbsp;<\/p>\n\n\n\n<p>Today we face a growing number of cyberattacks. Analysts can use the intrusion detection system to identify, minimize, and stop threats. In this post, we cover one of the industry\u2019s leading IDS, along with a use case, so you can have a full picture of how <a href=\"https:\/\/any.run\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=suricatadetection&amp;utm_content=landing&amp;utm_term=260124\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> identifies malware.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Intrusion Detection System<\/h2>\n\n\n\n<p>IDS is security software that checks the network for suspicious behavior. If something unusual happens, it sends a warning message about it. Moreover, the system allows being aware of possible malicious activities.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Two popular types of IDS:<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>NIDS \u2013 Network Intrusion Detection System<\/strong><\/li>\n<\/ol>\n\n\n\n<p>It includes the analysis of traffic, both in and out of the network. The system monitors if there are any malicious activities. NIDS\u2019s goal is to detect and alert about it.<\/p>\n\n\n\n<p><strong>      <\/strong>2. <strong>HIDS \u2013 Host Intrusion Detection System<\/strong><\/p>\n\n\n\n<p>It monitors any differences in the file set in the system. If there are any changes, it gives an alert message.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">We should also mention the subsets of IDS:&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Signature-based<\/strong><\/li>\n<\/ul>\n\n\n\n<p>This system tries to find instances of familiar threats. Once a verdict of a file is set, then goes the analysis of special characteristics and as a result, appears a signature that belongs to that very attack. These types of systems compare the pattern with an existing database of signatures. This is how the type of threat is detected. Please note that constant updates and expansion of the library are necessary.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Anomaly-based&nbsp;<\/strong><\/li>\n<\/ul>\n\n\n\n<p>This subset monitors the network\u2019s traffic for any suspicious behavior. First of all, it creates a normal model of the system\u2019s activity. Then it compares it with other existing models to find anomalies. That\u2019s the way to identify attacks for this type.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2021\/04\/img-suricata1.jpg\" alt=\"\" class=\"wp-image-1488\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Suricata IDS<\/h2>\n\n\n\n<p>Now that we know what IDS stands for, let\u2019s talk about <a href=\"https:\/\/any.run\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=suricatadetection&amp;utm_content=landing&amp;utm_term=260124\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>&#8216;s choice of the system. The platform uses the Suricata ruleset from different providers such as Proofpoint (Emerging Threats).&nbsp;<\/p>\n\n\n\n<p>Suricata is NIDS based on the signature and anomaly approaches. It utilizes externally developed rule sets to monitor network traffic in real-time and provides alerts to the system administrator when suspicious events occur. It helps to reveal the known threats, policy violations, and malicious behavior faster by using patterns. One of Suricata\u2019s benefits is that it acquires smart and elaborate processing architecture.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>A signature consists of the following:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Action<\/li>\n\n\n\n<li>Header<\/li>\n\n\n\n<li>Rule-options<\/li>\n<\/ul>\n\n\n\n<p>The IDS collects data at the application layer. Suricata is able to monitor protocol activity at high levels: SMB, FTP, and HTTP and low levels: UDP, TLS, TCP, and ICMP.&nbsp; Furthermore, with this IDS analysts can extract files and investigate them by themselves.<\/p>\n\n\n\n<p>Determining the type of threat or a malware family using the Suricata rules much simplifies and speeds up the workflow of a cybersecurity professional during file analysis. Signatures from the Open Sandbox&#8217;s rulesets are available for the Community plan\u2019s users. And with a Hunter subscription, you get access to more accurate and fresh Pro sets.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nAnalyze malware and phishing <br>in ANY.RUN&#8217;s <span class=\"highlight\">Interactive Sandbox<\/span>&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=blog&#038;utm_medium=article&#038;utm_campaign=suricatadetection&#038;utm_content=landing&#038;utm_term=260124#register\" rel=\"noopener\" target=\"_blank\">\nSign up free\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Suricata use case<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-37-1024x577.png\" alt=\"Click on the Threats tab to view all threats detected by Suricata rules\u00a0\u00a0\" class=\"wp-image-6766\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-37-1024x577.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-37-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-37-768x433.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-37-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-37-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-37-740x417.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-37.png 1100w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Click on the Threats tab to view all threats detected by Suricata rules&nbsp;&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>In ANY.RUN, the Threats section lists all instances of malicious network activity detected by Suricata rules. Let\u2019s have a look at an example.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"293\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-4-1024x293.png\" alt=\"\" class=\"wp-image-6762\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-4-1024x293.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-4-300x86.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-4-768x220.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-4-370x106.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-4-270x77.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-4-740x212.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-4.png 1166w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">The Message column features short threat descriptions&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>This <a href=\"https:\/\/app.any.run\/tasks\/b1aca315-217e-4a36-b9d2-cadf412d2fda\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=suricatadetection&amp;utm_content=task&amp;utm_term=260124\" target=\"_blank\" rel=\"noreferrer noopener\">analyzed sample<\/a> establishes a connection, immediately triggering a Suricata rule that confirms the presence of the Gh0st malware engaging in encrypted communication with its command-and-control server. By clicking on the corresponding threat on the list, you\u2019ll get to see more information on it.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"522\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-5-1024x522.png\" alt=\"Click on a threat from the list to see its details\u00a0\" class=\"wp-image-6765\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-5-1024x522.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-5-300x153.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-5-768x391.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-5-1536x782.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-5-370x188.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-5-270x138.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-5-740x377.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-5.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Click on a threat from the list to see its details&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>The Threat details window provides an overview of the malware detected and features links to external sources where you can learn more about the malware and its behavior. Here, you can also find information on the source and destination IP addresses, ports, and the transport protocol.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"524\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-6-1024x524.png\" alt=\"The Stream data section reveals packet.\u00a0\" class=\"wp-image-6763\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-6-1024x524.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-6-300x153.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-6-768x393.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-6-1536x785.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-6-370x189.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-6-270x138.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-6-585x300.png 585w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-6-740x378.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/01\/image-6.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">The Stream data section reveals packet.&nbsp;<\/figcaption><\/figure>\n\n\n\n<!-- CTA Split START -->\n<div class=\"cta-split\">\n<div class=\"cta__split-left\">\n\n<!-- Image -->\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/mcusercontent.com\/663b94f19348582a8dc323efe\/images\/0d88188b-3e89-2314-5a60-cb87e8077326.png\" alt=\"Learn to analyze malware in a sandbox\" class=\"cta__split-icon\" \/>\n<\/div>\n\n<div class=\"cta__split-right\">\n<div>\n\n<!-- Heading -->\n<h3 class=\"cta__split-heading\"><br>Learn to analyze cyber threats<\/h3>\n\n<!-- Text -->\n<p class=\"cta__split-text\">\nSee a detailed guide to using ANY.RUN&#8217;s <span class=\"highlight\">Interactive Sandbox<\/span> for malware and phishing analysis\n<br \/>\n<br \/>\n<\/p>\n<\/div>\n<!-- CTA Link -->\n<a target=\"_blank\" rel=\"noopener\" id=\"article-banner-split\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-in-a-sandbox\/\"><div class=\"cta__split-link\">Read full guide<\/div><\/a>\n<\/div>\n<\/div>\n<!-- CTA Split END -->\n<!-- CTA Split Styles START -->\n<style>\n.cta-split {\noverflow: hidden;\nmargin: 3rem 0;\ndisplay: grid;\njustify-items: center;\nborder-radius: 0.5rem;\nwidth: 100%;\nmin-height: 25rem;\ngrid-template-columns: repeat(2, 1fr);\nborder: 1px solid rgba(75, 174, 227, 0.32);\nfont-family: 'Catamaran Bold';\n}\n\n.cta__split-left {\ndisplay: flex;\nalign-items: center;\njustify-content: center;\nheight: 100%;\nwidth: 100%;\nbackground-color: #161c59;\nbackground-position: center center;\nbackground: rgba(32, 168, 241, 0.1);\n}\n\n.cta__split-icon { \nwidth: 100%;\nheight: auto;\nobject-fit: contain;\nmax-width: 100%;\n}\n\n.cta__split-right {\ndisplay: flex;\nflex-direction: column;\njustify-content: space-between;\npadding: 2rem;\n}\n\n.cta__split-heading { font-size: 1.5rem; }\n\n.cta__split-text {\nmargin-top: 1rem;\nfont-family: Lato, Roboto, sans-serif;\n}\n\n.cta__split-link {\npadding: 0.5rem 1rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: white;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\ndisplay: block;\nz-index: 1000;\nposition: relative;\ncursor: pointer !important;\n}\n\n.cta__split-link:hover {\nbackground-color: #68CBFF;\ncolor: white;\ncursor: pointer;\n}\n\n.highlight { color: #ea2526;}\n\n\n\/* Mobile styles START *\/\n@media only screen and (max-width: 768px) {\n\n.cta-split {\ngrid-template-columns: 1fr;\nmin-height: auto;\n}\n\n.cta__split-left {\nheight: auto;\nmin-height: 10rem;\n}\n\n\n.cta__split-left, .cta__split-right {\nheight: auto;\n}\n\n.cta__split-heading { font-size: 1.2rem; }\n\n.cta__split-text { font-size: 1rem; }\n.cta__split-icon {\nmax-height: auto;\nobject-fit: cover;\n}\n\n}\n\/* Mobile styles END *\/\n<\/style>\n<!-- CTA Split Styles END -->\n\n\n\n<p>By switching to the Stream data tab, you\u2019ll be able to inspect the captured packets.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/suricghost-1-1024x585.png\" alt=\"\" class=\"wp-image-7053\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/suricghost-1-1024x585.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/suricghost-1-300x171.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/suricghost-1-768x439.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/suricghost-1-1536x878.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/suricghost-1-370x212.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/suricghost-1-270x154.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/suricghost-1-740x423.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/suricghost-1.png 1814w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Hunter and Enterprise plan subscribers have exclusive access to the Suricata rule tab that contains the signature details used for threat identification.&nbsp; This enables users to observe how ET Open rulesets correlate with network activities.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion&nbsp;&nbsp;<\/h2>\n\n\n\n<p>IDS software offers real-time threat detection and network packet analysis to identify hosts and devices. Suricata, a popular IDS tool, is effectively integrated with ANY.RUN for rapid malware identification.&nbsp;<\/p>\n\n\n\n<p>Try all features of ANY.RUN by requesting a 14-day <a href=\"https:\/\/any.run\/demo\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=suricatadetection&amp;utm_content=trial&amp;utm_term=260124\" target=\"_blank\" rel=\"noreferrer noopener\">free demo \u2192<\/a>&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Editor\u2019s note: The current article was originally published on May 13, 2021, and updated on January 26, 2024.&nbsp; Today we face a growing number of cyberattacks. Analysts can use the intrusion detection system to identify, minimize, and stop threats. In this post, we cover one of the industry\u2019s leading IDS, along with a use case, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6767,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,32,34],"class_list":["post-1461","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-detection","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Detection with Suricata IDS - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Suricata IDS is one of the most popular intrusion detection systems. Let&#039;s talk about it and ANY.RUN use cases to identify malware with it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Detection with Suricata IDS\",\"datePublished\":\"2024-01-26T07:42:14+00:00\",\"dateModified\":\"2025-07-07T16:18:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\"},\"wordCount\":820,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"detection\",\"malware analysis\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\",\"name\":\"Detection with Suricata IDS - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-01-26T07:42:14+00:00\",\"dateModified\":\"2025-07-07T16:18:25+00:00\",\"description\":\"Suricata IDS is one of the most popular intrusion detection systems. Let's talk about it and ANY.RUN use cases to identify malware with it.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Detection with Suricata IDS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Detection with Suricata IDS - ANY.RUN&#039;s Cybersecurity Blog","description":"Suricata IDS is one of the most popular intrusion detection systems. Let's talk about it and ANY.RUN use cases to identify malware with it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Detection with Suricata IDS","datePublished":"2024-01-26T07:42:14+00:00","dateModified":"2025-07-07T16:18:25+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/"},"wordCount":820,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","detection","malware analysis"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/","url":"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/","name":"Detection with Suricata IDS - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-01-26T07:42:14+00:00","dateModified":"2025-07-07T16:18:25+00:00","description":"Suricata IDS is one of the most popular intrusion detection systems. Let's talk about it and ANY.RUN use cases to identify malware with it.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"Detection with Suricata IDS"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1461"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1461"}],"version-history":[{"count":8,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1461\/revisions"}],"predecessor-version":[{"id":14609,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1461\/revisions\/14609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/6767"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}