Home
Help
Search
Login
Register
OPNsense Forum
»
English Forums
»
Intrusion Detection and Prevention
»
suricata lead to 94% of false negative
« previous
next »
Print
Pages: [
1
]
Author
Topic: suricata lead to 94% of false negative (Read 3487 times)
bzos
Newbie
Posts: 1
Karma: 0
suricata lead to 94% of false negative
«
on:
June 17, 2018, 04:42:13 am »
hello every body,
I am using suricata with default rules all this rules are uncomented in suricata.yaml and the path of the rules is correct, i had evaluated against pytbull (tool for evaluation of ids) as results i had 94% of false negative and 0% rule matched ,i had create a simple rules for icmp ,the ping is identified by suricata ,what can be the cause of the false negative generated by suricata can be the ressource (cpu,ram)? because i am using machine with 4 gb ram the same machine use elastic search.
Logged
Print
Pages: [
1
]
« previous
next »
OPNsense Forum
»
English Forums
»
Intrusion Detection and Prevention
»
suricata lead to 94% of false negative