This project demonstrates deploying and validating a network Intrusion Detection System (IDS) using Suricata on Ubuntu. Attack and reconnaissance traffic was generated from a Kali Linux host and analyzed through Suricata alert logs.
- IDS Sensor: Ubuntu 24.04 with Suricata
- Attacker: Kali Linux
- Hypervisor: VMware Fusion
- Network: Isolated host-only lab network
- Suricata
- Kali Linux
- Nmap
- Ubuntu Linux
- VMware Fusion
- Installed and verified Suricata build features and packet capture support.
- Identified the correct monitoring interface on the IDS sensor.
- Updated and enabled Emerging Threats Open rules.
- Started Suricata in IDS mode and validated rule loading.
- Generated reconnaissance traffic from Kali Linux.
- Confirmed IDS alert generation using Suricata logs.
- Deployed and configured a Suricata IDS sensor to monitor live network traffic.
- Simulated reconnaissance activity from a Kali Linux host using Nmap.
- Validated IDS alert generation and reviewed Suricata fast.log entries.
- Demonstrated SOC Tier 1 workflows including sensor validation, rule management, and alert triage.





