Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1117

Suricata

What is Suricata?

SuricataAn open-source, high-performance network IDS, IPS, and security-monitoring engine maintained by the Open Information Security Foundation (OISF).


Suricata is a multi-threaded, open-source network security engine first released in 2010 and developed by the Open Information Security Foundation (OISF). It supports intrusion detection (IDS), inline intrusion prevention (IPS), and rich network security monitoring (NSM), producing logs in EVE JSON, protocol metadata (HTTP, TLS, DNS, SMB, Kerberos), and extracted files. Suricata understands Snort-compatible rules plus its own keywords (Lua, datasets, ja3, ja4), letting analysts reuse community rulesets such as ET Open and Talos. It is widely deployed at internet egress, in cloud TAPs, and in SOC sensor fleets, often alongside Zeek for richer protocol decoding.

Examples

  1. 01

    Running Suricata in inline IPS mode on a perimeter firewall to drop traffic matching ET Open rules.

  2. 02

    Feeding Suricata EVE JSON logs into a SIEM for correlation with endpoint telemetry.

Frequently asked questions

What is Suricata?

An open-source, high-performance network IDS, IPS, and security-monitoring engine maintained by the Open Information Security Foundation (OISF). It belongs to the Defense & Operations category of cybersecurity.

What does Suricata mean?

An open-source, high-performance network IDS, IPS, and security-monitoring engine maintained by the Open Information Security Foundation (OISF).

How does Suricata work?

Suricata is a multi-threaded, open-source network security engine first released in 2010 and developed by the Open Information Security Foundation (OISF). It supports intrusion detection (IDS), inline intrusion prevention (IPS), and rich network security monitoring (NSM), producing logs in EVE JSON, protocol metadata (HTTP, TLS, DNS, SMB, Kerberos), and extracted files. Suricata understands Snort-compatible rules plus its own keywords (Lua, datasets, ja3, ja4), letting analysts reuse community rulesets such as ET Open and Talos. It is widely deployed at internet egress, in cloud TAPs, and in SOC sensor fleets, often alongside Zeek for richer protocol decoding.

How do you defend against Suricata?

Defences for Suricata typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Suricata?

Common alternative names include: Suricata IDS, Suricata IPS.

Related terms

See also