I have few usecases for monitoring Suricata in wazuh.
- DDoS Attack
- Unauthorised Access
- Malware communication
- Data exfiltration
- SQL Injection
- Abnormal user privilege escalation
- Credential dumping
- Ransomware indicators
- Brute force attack
Etc…
To create custom rules for this usecases, which all parameters i can take?
Which will be the common tag?