ARCHIVES

Original Article

Threat Intelligence System Using Suricata by Dynamic Method

Rahul S1 Marimuthu R2
1M.SC CFIS, Dr. M.G.R Educational and Research Institute, Chennai, Tamilnadu, India. 2Assistant Professor, Faculty Center for Cyber Forensic and Information Security, University of Madras, Chennai, Tamilnadu, India.

Published Online: January-April 2025

Pages: 254-258

Abstract

With the adding complication of cyber risks, integrating Intrusion Discovery Systems (IDS) with real- time trouble intelligence has come vital. This study focuses on the dynamic integration of Suricata, an open- source IDS, with trouble intelligence feeds to enhance network security. Unlike traditional stationary rule- predicated approaches, the proposed system enables Suricata to roundly contemporize its rules and signatures predicated on live trouble intelligence feeds. This ensures real- time severity to arising risks and minimizes discovery gaps. The performance leverages automation tools, APIs, and custom scripts to bring, parse, and integrate trouble data efficiently. Performance evaluation demonstrates bettered discovery delicacy and reduced response times. This dynamic approach strengthens visionary trouble discovery and response, making network security more flexible to evolving cyber risks.

Related Articles

2025

Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions

2025

Exploring AI Techniques for Quantum Threat Detection and Prevention

2025

Maturity Models for Business Intelligence: An Overview

2025

INSPIRO: An AI Driven Institution Auditor

2025

Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems

2025

Predictive Modeling for College Admission Using Machine Learning and Statistical Methods

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20250401039

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.