Author: Sergey

September 28, 2025

Official Suri Oculus YouTube Channel Launched

We are excited to announce the launch of the official Suri Oculus YouTube channel! The channel will feature: Step-by-step tutorials on installation and configuration Demonstrations of key features, including event monitoring, rules management, and anomaly analytics Walkthroughs of the web interface to help you get

September 14, 2025

Suri Oculus is now on LinkedIn and Telegram!

We’re excited to share that the official LinkedIn page for Suri Oculus is now live:🔗 linkedin.com/company/suri-oculus Follow us there for: Project updates and release announcements Insights on Suricata IDS/IPS and AI-driven anomaly detection Community news and upcoming events In addition, we’ve launched our official Telegram

July 21, 2025

Suri Oculus Packages Released for Debian 12 and Ubuntu 22.04!

We’re excited to announce that Suri Oculus — the management and analysis system for IDS/IPS Suricata events — is now available as ready-to-use .deb packages for the popular Debian 12 and Ubuntu 22.04 distributions. Installation is now easier and faster, making it especially convenient for

May 14, 2025

Integrated AI Analysis of Suricata: From Streams to Multi-Anomalies

The project is being implemented within general framework of Suri-Oculus project (https://suri-oculus.com). Introduction Suricata is a powerful engine for network traffic analysis and intrusion detection (IDS/IPS), capable of generating rich event streams. However, in real-world conditions, simple logical event analysis is not enough. Distributed attacks,

January 31, 2025

Suri Oculus 2.0 is officially released!

We are excited to announce that Suri Oculus 2.0 (https://suri-oculus.com)is now available for download! This high-performance IDS/IPS system for log management and analysis is built on Suricata and Pistache (C++), with Redis as the database. This update brings numerous key improvements, making working with IDS/IPS

December 18, 2024

Important Notice

The section defining rule files in your Suricata configuration should be structured as follows: rule-files:- suricata.rules- additional.rules# – ioc_url.rules# – ioc_ip.rules# – ioc_domain.rules In addition to the default file (suricata.rules), several other files can be included. About additional.rules The additional.rules file is designed to contain