
Suricata sits on a network span port or inline tap and inspects every packet flowing through your infrastructure. It runs three detection modes: signature matching against thousands of community rules (compatible with Snort rules out of the box), inline prevention that drops malicious packets before they reach targets, and network security monitoring that logs protocol transactions in EVE JSON format for forensic analysis.
Developed by the Open Information Security Foundation (OISF) with early backing from the US Department of Homeland Security. Active since 2009, widely deployed across government, enterprise, and industrial environments.
OT networks were designed for reliability, not security — flat segments, legacy protocols, air-gap assumptions that no longer hold. Suricata is one of the few open-source IDS engines with built-in parsers for industrial protocols.
The MQTT parser catches anomalies in IIoT message buses. Community rule sets from CyberICS and NSA/CISA EliteWolf provide OT-specific signatures for Modbus function code abuse, unauthorized DNP3 commands, and suspicious traffic patterns between network zones.
That said, Suricata is a general-purpose network IDS that happens to support industrial protocols — it's not an OT-specific product. Most of its 20+ parsers are IT protocols (HTTP, TLS, DNS, SMB). The OT coverage is real but narrower than dedicated ICS security tools.
Hardware: 4+ CPU cores, 8 GB RAM minimum for production. SSD recommended for log volumes. You need a SPAN port or network TAP to mirror traffic to the Suricata sensor.
| Deployment | Use case |
|---|---|
| Native packages (apt/yum) | Production Linux servers, dedicated sensors |
| Docker container | Quick evaluation, CI/CD, isolated environments |
| Kubernetes DaemonSet | Monitoring pod-to-pod traffic in clusters |
| SELKS (Stamus Networks) | Turnkey platform bundling Suricata + ELK + Scirius rule management |
Rule tuning is where the real work is. Out-of-the-box rules generate false positives, especially on industrial protocols that reuse common ports. Budget 2-4 weeks to tune for your environment before trusting alert quality.
Suricata feeds network-level alerts into Wazuh for correlation with host-based events, creating a unified IT/OT security monitoring stack.
Suricata EVE JSON alert data can be visualized in Grafana via Elasticsearch or Loki, providing real-time security dashboards alongside OT metrics.
Malcolm embeds Suricata as its signature-based detection engine, running it in IDS mode against live traffic or uploaded PCAPs and indexing all alerts into OpenSearch.