OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • English Forums »
  • Intrusion Detection and Prevention »
  • suricata lead to 94% of false negative
« previous next »
  • Print
Pages: [1]

Author Topic: suricata lead to 94% of false negative  (Read 3503 times)

bzos

  • Newbie
  • *
  • Posts: 1
  • Karma: 0
    • View Profile
suricata lead to 94% of false negative
« on: June 17, 2018, 04:42:13 am »
hello every body,
I am using suricata with default rules all this rules are uncomented in suricata.yaml and the path of the rules is correct, i had evaluated against pytbull (tool for evaluation of ids) as results i had 94% of false negative and 0% rule matched ,i had create a simple rules for icmp ,the ping is identified by suricata ,what can be the cause of the false negative generated by suricata  can be the ressource (cpu,ram)? because i am using machine with 4 gb ram the same machine use elastic search.
Logged

  • Print
Pages: [1]
« previous next »
  • OPNsense Forum »
  • English Forums »
  • Intrusion Detection and Prevention »
  • suricata lead to 94% of false negative
 

OPNsense is an OSS project © Deciso B.V. 2015 - 2024 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2