heroui logo

Suricata and Elastic Defend Network Correlation

Elastic Detection Rules

View Source
Summary
The detection rule focuses on integrating alerts from Suricata, an open-source network threat detection engine, with Elastic Defend network events to uncover the origins of malicious network activities on various operating systems. This correlation is designed to identify and track network communications indicative of potential command and control (C2) operations. By evaluating sequences of network events, it captures unusual traffic involving alerts from Suricata and cross-references it against endpoint behavioral data. This allows for a deeper analysis of processes involved in the detected traffic.<br><br>The rule employs EQL (Event Query Language) to analyze network events across a defined temporal sequence, specifically looking for alerts that contrast with benign activity, given their non-null source and destination IPs. The maturity of this rule indicates it's in production, meaning it has been tested and verified to function effectively in detecting relevant threats in real time.
Categories
  • Endpoint
  • Network
  • Linux
  • Windows
  • macOS
Data Sources
  • Network Traffic
  • Process
  • Malware Repository
Created: 2025-12-10