Hi All,
I am new to Suricata. I am testing Suricata 6.0.1 on Windows 10 with Snort community signatures for the comparison. I attack with Hping3 to Snort and Suricata in detect mode on similar PCs.
ie. I send 1000 Syn Packets to both hence Snort capture 1000 Syn packets and alerts 1000 and Suricata captures 1000 Syn packets but alerts 6 as seen below. Could you please help to understand the logs properly and if needs any improvement for the configuration.
Thanks.
Counter | TM Name | Value
capture.kernel_packets | Total | 1004
decoder.pkts | Total | 1005
decoder.bytes | Total | 174378
decoder.ipv4 | Total | 1003
decoder.ethernet | Total | 1005
decoder.tcp | Total | 1000
decoder.udp | Total | 3
decoder.avg_pkt_size | Total | 173
decoder.max_pkt_size | Total | 174
flow.tcp | Total | 1000
flow.udp | Total | 1
flow.wrk.spare_sync_avg | Total | 100
flow.wrk.spare_sync | Total | 12
tcp.syn | Total | 1000
detect.alert | Total | 6
app_layer.flow.failed_udp | Total | 1
flow.mgr.full_hash_pass | Total | 1
flow.spare | Total | 10100
flow.mgr.rows_maxlen | Total | 1
flow.mgr.flows_checked | Total | 119
flow.mgr.flows_notimeout | Total | 119
tcp.memuse | Total | 2293760
tcp.reassembly_memuse | Total | 393216
flow.memuse | Total | 7177504