ARCHIVES
Original Article
Threat Intelligence System Using Suricata by Dynamic Method
Rahul S1
Marimuthu R2
1M.SC CFIS, Dr. M.G.R Educational and Research Institute, Chennai, Tamilnadu, India. 2Assistant Professor, Faculty Center for Cyber Forensic and Information Security, University of Madras, Chennai, Tamilnadu, India.
Published Online: January-April 2025
Pages: 254-258
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20250401039References
1. Smith, J., & Brown, K. (2023), "Enhancing Intrusion Detection Systems with Dynamic Threat Intelligence," IEEE Transactions on
Cybersecurity, pp. 45-56, Vol. 12.
2. Patel, R., & Kumar, S. (2022), "Automated Rule Updates for Suricata IDS Using Threat Feeds," Journal of Network Security, pp. 102-
110, Vol. 9.
3. Ahmed, M., & Lee, T. (2021), "Real-Time Integration of Threat Feeds in Intrusion Detection Systems," Elsevier Computers & Security,
pp. 77-89, Vol. 18.
4. Johnson, P., & Wilson, B. (2020), "Challenges in Static vs. Dynamic IDS Rule Management," ACM Digital Threat Analysis, pp. 30-
42, Vol. 5.
5. Garcia, L., & Stevens, R. (2020), "Threat Intelligence-Driven Intrusion Detection: A Comparative Study," Springer Cyber Threat
Intelligence Journal, pp. 110-125, Vol. 6.
6. Gonzalez, J., & Park, H. (2020), "Cyber Threat Intelligence and Intrusion Detection: A Comparative Study," Journal of Information
Security & Cyber Resilience, pp. 30-47, Vol. 9(1).
7. Almukaynizi, M., Rizvi, S., & Zaman, N. (2020), "A Survey on Threat Intelligence Integration with IDS," Cybersecurity & Information
Systems Journal, pp. 67-82, Vol. 12(2).
8. Kumar, A., & Verma, R. (2020), "Adaptive Intrusion Detection Using Threat Intelligence," Journal of Advanced Cybersecurity Studies,
pp. 99-115, Vol. 7(4).
9. Shinde, S., & Patil, M. (2020), "Enhancing IDS with Real-Time Threat Intelligence," International Journal of Cybersecurity Research,
pp. 45-56, Vol. 5(2).
10. Doupé, A., Cui, W., & Peinado, M. (2021), "Automated Threat Intelligence Integration for IDS," IEEE Transactions on Information
Forensics and Security, pp. 789-804, Vol. 14(3).
11. Patel, R., Sharma, K., & Banerjee, P. (2022), "Machine Learning-Driven Threat Intelligence for Intrusion Detection," Cybersecurity
Advances, pp. 112-129, Vol. 10(3).
12. Lee, S., & Lee, J. (2023), "Real-Time Network Threat Analysis Using Threat Intelligence Feeds," Journal of Network Security &
Management, pp. 23-35, Vol. 8(1).
Cybersecurity, pp. 45-56, Vol. 12.
2. Patel, R., & Kumar, S. (2022), "Automated Rule Updates for Suricata IDS Using Threat Feeds," Journal of Network Security, pp. 102-
110, Vol. 9.
3. Ahmed, M., & Lee, T. (2021), "Real-Time Integration of Threat Feeds in Intrusion Detection Systems," Elsevier Computers & Security,
pp. 77-89, Vol. 18.
4. Johnson, P., & Wilson, B. (2020), "Challenges in Static vs. Dynamic IDS Rule Management," ACM Digital Threat Analysis, pp. 30-
42, Vol. 5.
5. Garcia, L., & Stevens, R. (2020), "Threat Intelligence-Driven Intrusion Detection: A Comparative Study," Springer Cyber Threat
Intelligence Journal, pp. 110-125, Vol. 6.
6. Gonzalez, J., & Park, H. (2020), "Cyber Threat Intelligence and Intrusion Detection: A Comparative Study," Journal of Information
Security & Cyber Resilience, pp. 30-47, Vol. 9(1).
7. Almukaynizi, M., Rizvi, S., & Zaman, N. (2020), "A Survey on Threat Intelligence Integration with IDS," Cybersecurity & Information
Systems Journal, pp. 67-82, Vol. 12(2).
8. Kumar, A., & Verma, R. (2020), "Adaptive Intrusion Detection Using Threat Intelligence," Journal of Advanced Cybersecurity Studies,
pp. 99-115, Vol. 7(4).
9. Shinde, S., & Patil, M. (2020), "Enhancing IDS with Real-Time Threat Intelligence," International Journal of Cybersecurity Research,
pp. 45-56, Vol. 5(2).
10. Doupé, A., Cui, W., & Peinado, M. (2021), "Automated Threat Intelligence Integration for IDS," IEEE Transactions on Information
Forensics and Security, pp. 789-804, Vol. 14(3).
11. Patel, R., Sharma, K., & Banerjee, P. (2022), "Machine Learning-Driven Threat Intelligence for Intrusion Detection," Cybersecurity
Advances, pp. 112-129, Vol. 10(3).
12. Lee, S., & Lee, J. (2023), "Real-Time Network Threat Analysis Using Threat Intelligence Feeds," Journal of Network Security &
Management, pp. 23-35, Vol. 8(1).
Related Articles
2025
Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions
2025
Exploring AI Techniques for Quantum Threat Detection and Prevention
2025
Maturity Models for Business Intelligence: An Overview
2025
INSPIRO: An AI Driven Institution Auditor
2025
Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems
2025