Author: Sergey

September 28, 2025

Official Suri Oculus YouTube Channel Launched

We are excited to announce the launch of the official Suri Oculus YouTube channel! The channel will feature: Step-by-step tutorials on installation and configuration Demonstrations of key features, including event monitoring, rules management, and anomaly analytics Walkthroughs of the web interface to help you get […]

September 14, 2025

Suri Oculus is now on LinkedIn and Telegram!

We’re excited to share that the official LinkedIn page for Suri Oculus is now live:? linkedin.com/company/suri-oculus Follow us there for: Project updates and release announcements Insights on Suricata IDS/IPS and AI-driven anomaly detection Community news and upcoming events In addition, we’ve launched our official Telegram […]

July 21, 2025

Suri Oculus Packages Released for Debian 12 and Ubuntu 22.04!

We’re excited to announce that Suri Oculus — the management and analysis system for IDS/IPS Suricata events — is now available as ready-to-use .deb packages for the popular Debian 12 and Ubuntu 22.04 distributions. Installation is now easier and faster, making it especially convenient for […]

May 14, 2025

Integrated AI Analysis of Suricata: From Streams to Multi-Anomalies

The project is being implemented within general framework of Suri-Oculus project (https://suri-oculus.com). Introduction Suricata is a powerful engine for network traffic analysis and intrusion detection (IDS/IPS), capable of generating rich event streams. However, in real-world conditions, simple logical event analysis is not enough. Distributed attacks, […]

January 31, 2025

Suri Oculus 2.0 is officially released!

We are excited to announce that Suri Oculus 2.0 (https://suri-oculus.com)is now available for download! This high-performance IDS/IPS system for log management and analysis is built on Suricata and Pistache (C++), with Redis as the database. This update brings numerous key improvements, making working with IDS/IPS […]

December 18, 2024

Important Notice

The section defining rule files in your Suricata configuration should be structured as follows: rule-files:- suricata.rules- additional.rules# – ioc_url.rules# – ioc_ip.rules# – ioc_domain.rules In addition to the default file (suricata.rules), several other files can be included. About additional.rules The additional.rules file is designed to contain […]