-
Version2.4.150 Installation MethodSecurity Onion ISO image Descriptionother (please provide detail below) Installation TypeStandalone Locationon-prem with Internet access Hardware SpecsMeets minimum requirements CPU4 RAM32 GB Storage for /162 Storage for /nsm326 Network Traffic Collectionspan port Network Traffic SpeedsLess than 1Gbps StatusYes, all services on all nodes are running OK Salt StatusNo, there are no failures LogsYes, there are additional clues in /opt/so/log/ (please provide detail below) DetailHello, I disabled all preexisting rules and created a custom NIDS rule following the documentation https://docs.securityonion.net/en/2.4/nids.html#adding-new-nids-rules: Initially, the rule had a mismatch ( not the subeject of this discussion ), but after a full Security Onion restart, the rule was correctly loaded. To test the rule, I continuously pinged a device, and alerts began to appear in the alert table. ObservationsBased on the logs show bellow, it appears that alerts are being detected but then automatically suppressed. We did not set any thresholds initially and even after adding a threshold directly to the Suricata rule or via the tuning section, the behavior persisted. Additionnal Observations
Steps Taken:
Used Administration > Configuration > Suricata > config to increase:
Increase None of these changes resolved the issue. If you need any additional information, please let me know — I’ll be happy to provide it. Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 5 replies
-
What does your rule look like? |
Beta Was this translation helpful? Give feedback.
-
The rule is as followed Same behaviour so we then remove the tunning part and add the thresold directly into the rule source itself following suricata documentation https://docs.suricata.io/en/latest/rules/thresholding.html Everytime a rule was modifiy we did a suricata full update in the detection view followed by a so-suricata-restart the sid is the one so gave me when using create nids |
Beta Was this translation helpful? Give feedback.
After further testing, as suggested, I found two working solutions:
Adjusting flow timeout:
Changing the
flow-timeout: established
value from 300 to 1 causes alerts from continuous pings to appear approximately every 2 minutes in the SOC dashboard. This behavior can likely be tuned further.Using flow:stateless in the detection source of the rule:
Adding
flow:stateless
makes each ping trigger a separate alert, which then appears consistently. The alert rate can then be controlled using thresholds.Both approches work, I'll consider the issue resolved.
Thanks again for the support