ARCHIVES

Original Article

Threat Intelligence System Using Suricata by Dynamic Method

Rahul S1 Marimuthu R2
1M.SC CFIS, Dr. M.G.R Educational and Research Institute, Chennai, Tamilnadu, India. 2Assistant Professor, Faculty Center for Cyber Forensic and Information Security, University of Madras, Chennai, Tamilnadu, India.

Published Online: January-April 2025

Pages: 254-258

References

1. Smith, J., & Brown, K. (2023), "Enhancing Intrusion Detection Systems with Dynamic Threat Intelligence," IEEE Transactions on
Cybersecurity, pp. 45-56, Vol. 12.
2. Patel, R., & Kumar, S. (2022), "Automated Rule Updates for Suricata IDS Using Threat Feeds," Journal of Network Security, pp. 102-
110, Vol. 9.
3. Ahmed, M., & Lee, T. (2021), "Real-Time Integration of Threat Feeds in Intrusion Detection Systems," Elsevier Computers & Security,
pp. 77-89, Vol. 18.
4. Johnson, P., & Wilson, B. (2020), "Challenges in Static vs. Dynamic IDS Rule Management," ACM Digital Threat Analysis, pp. 30-
42, Vol. 5.
5. Garcia, L., & Stevens, R. (2020), "Threat Intelligence-Driven Intrusion Detection: A Comparative Study," Springer Cyber Threat
Intelligence Journal, pp. 110-125, Vol. 6.
6. Gonzalez, J., & Park, H. (2020), "Cyber Threat Intelligence and Intrusion Detection: A Comparative Study," Journal of Information
Security & Cyber Resilience, pp. 30-47, Vol. 9(1).
7. Almukaynizi, M., Rizvi, S., & Zaman, N. (2020), "A Survey on Threat Intelligence Integration with IDS," Cybersecurity & Information
Systems Journal, pp. 67-82, Vol. 12(2).
8. Kumar, A., & Verma, R. (2020), "Adaptive Intrusion Detection Using Threat Intelligence," Journal of Advanced Cybersecurity Studies,
pp. 99-115, Vol. 7(4).
9. Shinde, S., & Patil, M. (2020), "Enhancing IDS with Real-Time Threat Intelligence," International Journal of Cybersecurity Research,
pp. 45-56, Vol. 5(2).
10. Doupé, A., Cui, W., & Peinado, M. (2021), "Automated Threat Intelligence Integration for IDS," IEEE Transactions on Information
Forensics and Security, pp. 789-804, Vol. 14(3).
11. Patel, R., Sharma, K., & Banerjee, P. (2022), "Machine Learning-Driven Threat Intelligence for Intrusion Detection," Cybersecurity
Advances, pp. 112-129, Vol. 10(3).
12. Lee, S., & Lee, J. (2023), "Real-Time Network Threat Analysis Using Threat Intelligence Feeds," Journal of Network Security &
Management, pp. 23-35, Vol. 8(1).

Related Articles

2025

Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions

2025

Exploring AI Techniques for Quantum Threat Detection and Prevention

2025

Maturity Models for Business Intelligence: An Overview

2025

INSPIRO: An AI Driven Institution Auditor

2025

Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems

2025

Predictive Modeling for College Admission Using Machine Learning and Statistical Methods

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20250401039

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.