{"id":7,"date":"2023-01-16T19:16:22","date_gmt":"2023-01-16T13:46:22","guid":{"rendered":"https:\/\/hackzone.in\/blog\/?p=7"},"modified":"2023-02-01T17:20:14","modified_gmt":"2023-02-01T11:50:14","slug":"how-to-install-suricata-in-linux","status":"publish","type":"post","link":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/","title":{"rendered":"How to install Suricata in Linux."},"content":{"rendered":"\n<p>Suricata is an open-source network intrusion detection and prevention system (IDS\/IPS) that can be used to detect and prevent cyber attacks on a computer network. It uses a variety of techniques, including signature-based detection and protocol analysis, to identify and block malicious traffic.<\/p>\n\n\n\n<p>Installing Suricata on a Linux operating system is a multi-step process that involves the following steps:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">  \r\n    \r\n<div id=\"wpj-jtoc\" class=\"wpj-jtoc wpj-jtoc--main --jtoc-the-content --jtoc-theme-original --jtoc-title-align-left --jtoc-toggle-icon --jtoc-toggle-position-right --jtoc-toggle-1 --jtoc-has-numeration --jtoc-numeration-legacy --jtoc-has-custom-styles --jtoc-is-unfolded --jtoc-align-left\" >\r\n  <!-- TOC -->\r\n        <div class=\"wpj-jtoc--toc wpj-jtoc--toc-inline \" >\r\n              <div class=\"wpj-jtoc--header\">\r\n        <div class=\"wpj-jtoc--header-main\">\r\n                    <div class=\"wpj-jtoc--title\">\r\n                        <span class=\"wpj-jtoc--title-label\">Table of contents<\/span>\r\n          <\/div>\r\n                                <div class=\"wpj-jtoc--toggle-wrap\">\r\n                                                          <div class=\"wpj-jtoc--toggle-box\">\r\n                  <div class=\"wpj-jtoc--toggle\"><\/div>\r\n                <\/div>\r\n                          <\/div>\r\n                  <\/div>\r\n      <\/div>\r\n            <div class=\"wpj-jtoc--body\">\r\n            <nav class=\"wpj-jtoc--nav\">\r\n        <ol class=\"wpj-jtoc--items\"><li class=\"wpj-jtoc--item --jtoc-h2\">\r\n        <div class=\"wpj-jtoc--item-content --jtoc-h2\" data-depth=\"2\">\r\n                                                <a href=\"#1-verify-that-your-linux-system-meets-the-minimum-requirements-for-running-suricata-this-includes-checking-that-you-have-a-supported-version-of-linux-and-that-you-have-the-necessary-dependencies-installed\"  title=\"Minimum requirements for running Suricata.\" data-numeration=\"1\">Minimum requirements for running Suricata.<\/a>\r\n                    <\/div><\/li><li class=\"wpj-jtoc--item --jtoc-h2\">\r\n        <div class=\"wpj-jtoc--item-content --jtoc-h2\" data-depth=\"2\">\r\n                                                <a href=\"#2-download-the-latest-version-of-suricata-from-the-official-website-https-suricata-idsorg-download\"  title=\"Download the latest version of Suricata from the official website\" data-numeration=\"2\">Download the latest version of Suricata from the official website<\/a>\r\n                    <\/div><\/li><li class=\"wpj-jtoc--item --jtoc-h2\">\r\n        <div class=\"wpj-jtoc--item-content --jtoc-h2\" data-depth=\"2\">\r\n                                                <a href=\"#3extract-the-downloaded-package-using-the-command\"  title=\"Extract the downloaded package using the command \" data-numeration=\"3\">Extract the downloaded package using the command <\/a>\r\n                    <\/div><\/li><li class=\"wpj-jtoc--item --jtoc-h2\">\r\n        <div class=\"wpj-jtoc--item-content --jtoc-h2\" data-depth=\"2\">\r\n                                                <a href=\"#4-change-directory-to-the-extracted-package-by-running\"  title=\"Change directory to the extracted package by running \" data-numeration=\"4\">Change directory to the extracted package by running <\/a>\r\n                    <\/div><\/li><li class=\"wpj-jtoc--item --jtoc-h2\">\r\n        <div class=\"wpj-jtoc--item-content --jtoc-h2\" data-depth=\"2\">\r\n                                                <a href=\"#5-run-the-command\"  title=\"Run the command \" data-numeration=\"5\">Run the command <\/a>\r\n                    <\/div><\/li><li class=\"wpj-jtoc--item --jtoc-h2\">\r\n        <div class=\"wpj-jtoc--item-content --jtoc-h2\" data-depth=\"2\">\r\n                                                <a href=\"#to-configure-the-installation\"  title=\"to configure the installation.\" data-numeration=\"6\">to configure the installation.<\/a>\r\n                    <\/div><\/li><li class=\"wpj-jtoc--item --jtoc-h2\">\r\n        <div class=\"wpj-jtoc--item-content --jtoc-h2\" data-depth=\"2\">\r\n                                                <a href=\"#6-run-the-command-to-build-the-source-code\"  title=\"Run the command to build the source code.\" data-numeration=\"7\">Run the command to build the source code.<\/a>\r\n                    <\/div><\/li><li class=\"wpj-jtoc--item --jtoc-h2\">\r\n        <div class=\"wpj-jtoc--item-content --jtoc-h2\" data-depth=\"2\">\r\n                                                <a href=\"#7-run-the-command-to-install-suricata\"  title=\"Run the command to install Suricata.\" data-numeration=\"8\">Run the command to install Suricata.<\/a>\r\n                    <\/div><\/li><li class=\"wpj-jtoc--item --jtoc-h2\">\r\n        <div class=\"wpj-jtoc--item-content --jtoc-h2\" data-depth=\"2\">\r\n                                                <a href=\"#8-configure-suricata-by-editing-the-configuration-file-located-at-etc-suricata-suricatayaml\"  title=\"Configure Suricata by editing the configuration file \" data-numeration=\"9\">Configure Suricata by editing the configuration file <\/a>\r\n                    <\/div><\/li><li class=\"wpj-jtoc--item --jtoc-h2\">\r\n        <div class=\"wpj-jtoc--item-content --jtoc-h2\" data-depth=\"2\">\r\n                                                <a href=\"#9-start-suricata-by-running-the-command\"  title=\"Start Suricata by running the command \" data-numeration=\"10\">Start Suricata by running the command <\/a>\r\n                    <\/div><\/li><li class=\"wpj-jtoc--item --jtoc-h2\">\r\n        <div class=\"wpj-jtoc--item-content --jtoc-h2\" data-depth=\"2\">\r\n                                                <a href=\"#10-verify-that-suricata-is-running-correctly-by-checking-the-output-of-the-command\"  title=\"Verify that Suricata is running correctly\" data-numeration=\"11\">Verify that Suricata is running correctly<\/a>\r\n                    <\/div><\/li><\/ol>      <\/nav>\r\n          <\/div>\r\n      <\/div>\r\n    <\/div>\r\n<\/div><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><\/li>\n<\/ul>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#1_Verify_that_your_Linux_system_meets_the_minimum_requirements_for_running_Suricata_This_includes_checking_that_you_have_a_supported_version_of_Linux_and_that_you_have_the_necessary_dependencies_installed\" >1. Verify that your Linux system meets the minimum requirements for running Suricata. This includes checking that you have a supported version of Linux and that you have the necessary dependencies installed.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#2_Download_the_latest_version_of_Suricata_from_the_official_website_https_suricata-idsorgdownload\" >2. Download the latest version of Suricata from the official website (https:\/\/suricata-ids.org\/download\/)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#3Extract_the_downloaded_package_using_the_command\" >3.Extract the downloaded package using the command<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#4_Change_directory_to_the_extracted_package_by_running\" >4. Change directory to the extracted package by running<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#5_Run_the_command\" >5. Run the command<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#to_configure_the_installation\" >to configure the installation.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#6_Run_the_command_to_build_the_source_code\" >6. Run the command to build the source code.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#7_Run_the_command_to_install_Suricata\" >7. Run the command to install Suricata.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#8_Configure_Suricata_by_editing_the_configuration_file_located_at_etcsuricatasuricatayaml\" >8. Configure Suricata by editing the configuration file located at \/etc\/suricata\/suricata.yaml.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#9_Start_Suricata_by_running_the_command\" >9. Start Suricata by running the command<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#10_Verify_that_Suricata_is_running_correctly_by_checking_the_output_of_the_command\" >10. Verify that Suricata is running correctly by checking the output of the command<\/a><\/li><\/ul><\/nav><\/div>\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Verify_that_your_Linux_system_meets_the_minimum_requirements_for_running_Suricata_This_includes_checking_that_you_have_a_supported_version_of_Linux_and_that_you_have_the_necessary_dependencies_installed\"><\/span>1. Verify that your Linux system meets the minimum requirements for running Suricata. This includes checking that you have a supported version of Linux and that you have the necessary dependencies installed.<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>A supported version of Linux: Suricata is compatible with various Linux distributions such as Ubuntu, Debian, Fedora, and CentOS. You can check your Linux version by running the command.<\/strong><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>GCC compiler: Suricata requires a C compiler to build the source code. You can check if GCC is installed on your system by running the command<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>\"gcc --version\"<\/strong><\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Libpcap library: Suricata uses the libpcap library to capture network traffic. You can check if libpcap is installed on your system by running the command <\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>\"ldconfig -p | grep libpcap\"<\/strong><\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>libyaml library: Suricata uses the libyaml library for parsing YAML files. You can check if libyaml is installed on your system by running the command <\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>\"ldconfig -p | grep libyaml\"<\/strong><\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>libjansson library: Suricata uses the libjansson library for JSON data handling. You can check if libjansson is installed on your system by running the command <\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>\"ldconfig -p | grep libjansson\"<\/strong><\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>libmagic library: Suricata uses the libmagic library to detect file types. You can check if libmagic is installed on your system by running the command <\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>\"ldconfig -p | grep libmagic\"<\/strong><\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"609\" height=\"412\" src=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/01.png\" alt=\"\" class=\"wp-image-9\" srcset=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/01.png 609w, https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/01-300x203.png 300w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><\/li>\n<\/ul>\n\n\n\n<p>Please note that these commands are for checking the dependencies in Ubuntu and Debian based distributions. In other distributions, the package manager commands may be different, for example, in Red Hat-based systems, you should use <strong>yum<\/strong> instead of <strong>apt-get<\/strong>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Download_the_latest_version_of_Suricata_from_the_official_website_https_suricata-idsorgdownload\"><\/span>2. Download the latest version of Suricata from the official website (<a href=\"https:\/\/suricata-ids.org\/download\/\">https:\/\/suricata-ids.org\/download\/<\/a>)<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"74\" src=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/1.jpg\" alt=\"\" class=\"wp-image-10\" srcset=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/1.jpg 651w, https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/1-300x34.jpg 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3Extract_the_downloaded_package_using_the_command\"><\/span>3.Extract the downloaded package using the command <span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>tar -xvzf suricata-version.tar.gz<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"74\" data-id=\"11\" src=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/2.jpg\" alt=\"\" class=\"wp-image-11\" srcset=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/2.jpg 651w, https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/2-300x34.jpg 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/figure>\n<\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Change_directory_to_the_extracted_package_by_running\"><\/span>4. Change directory to the extracted package by running <span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>cd suricata-version<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"74\" src=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/3.jpg\" alt=\"\" class=\"wp-image-12\" srcset=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/3.jpg 651w, https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/3-300x34.jpg 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Run_the_command\"><\/span>5. Run the command <span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>\".\/configure --prefix=\/usr --sysconfdir=\/etc --localstatedir=\/var\"<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"to_configure_the_installation\"><\/span> to configure the installation.<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"74\" src=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/4.jpg\" alt=\"\" class=\"wp-image-13\" srcset=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/4.jpg 651w, https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/4-300x34.jpg 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Run_the_command_to_build_the_source_code\"><\/span>6. Run the command to build the source code.<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>\"make\"<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"74\" src=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/5.jpg\" alt=\"\" class=\"wp-image-16\" srcset=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/5.jpg 651w, https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/5-300x34.jpg 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_Run_the_command_to_install_Suricata\"><\/span>7. Run the command to install Suricata.<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo make install-full<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"74\" src=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/6-1.jpg\" alt=\"\" class=\"wp-image-15\" srcset=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/6-1.jpg 651w, https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/6-1-300x34.jpg 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"8_Configure_Suricata_by_editing_the_configuration_file_located_at_etcsuricatasuricatayaml\"><\/span>8. Configure Suricata by editing the configuration file located at \/etc\/suricata\/suricata.yaml.<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"74\" src=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/7.jpg\" alt=\"\" class=\"wp-image-17\" srcset=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/7.jpg 651w, https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/7-300x34.jpg 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"9_Start_Suricata_by_running_the_command\"><\/span>9. Start Suricata by running the command <span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>(assuming that the interface you want to listen on is eth0)<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\"suricata -c \/etc\/suricata\/suricata.yaml -i eth0\" <\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"74\" src=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/8.jpg\" alt=\"\" class=\"wp-image-18\" srcset=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/8.jpg 651w, https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/8-300x34.jpg 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"10_Verify_that_Suricata_is_running_correctly_by_checking_the_output_of_the_command\"><\/span>10. Verify that Suricata is running correctly by checking the output of the command <span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo suricata -i eth0 --list-runmode-helpers<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"74\" src=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/9.jpg\" alt=\"\" class=\"wp-image-19\" srcset=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/9.jpg 651w, https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/9-300x34.jpg 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>It&#8217;s always recommended to check the official documentation of Suricata for the specific version that you are installing and to be aware of the dependencies that your system needs to have installed before proceeding with the installation. It\u2019s always recommended to consult the official documentation of Suricata for the specific version that you are installing and to be aware of the dependencies that your system needs to have installed.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Suricata is an open-source network intrusion detection and prevention system (IDS\/IPS) that can be used to detect and prevent cyber attacks on a computer network. It uses a variety of techniques, including signature-based detection and protocol analysis, to identify and block malicious traffic. Installing Suricata on a Linux operating system is a multi-step process that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,9,5,13,6,7,8],"tags":[29,24,25,21,22,19,20,27,23,28,26,18],"class_list":["post-7","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-ddos","category-ethical-hacking","category-malware","category-network-security","category-ransomware","category-trojan","tag-cybersecurity","tag-file-signatures","tag-heuristic-analysis","tag-intrusion-detection-system","tag-intrusion-prevention-system","tag-malware-detection","tag-network-security","tag-network-threats","tag-network-traffic-analysis","tag-open-source-security-solutions","tag-security-policies","tag-suricata"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to install Suricata in Linux. - Hackzone Cyber Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to install Suricata in Linux. - Hackzone Cyber Security Blog\" \/>\n<meta property=\"og:description\" content=\"Suricata is an open-source network intrusion detection and prevention system (IDS\/IPS) that can be used to detect and prevent cyber attacks on a computer network. It uses a variety of techniques, including signature-based detection and protocol analysis, to identify and block malicious traffic. Installing Suricata on a Linux operating system is a multi-step process that [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"Hackzone Cyber Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hackzone.in\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-16T13:46:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-01T11:50:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/How-to-install-Suricata-in-Linux_.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"624\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hack Zone\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hack Zone\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/how-to-install-suricata-in-linux\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/how-to-install-suricata-in-linux\\\/\"},\"author\":{\"name\":\"Hack Zone\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#\\\/schema\\\/person\\\/21baa23c7ede39c1a491da2e47566bce\"},\"headline\":\"How to install Suricata in Linux.\",\"datePublished\":\"2023-01-16T13:46:22+00:00\",\"dateModified\":\"2023-02-01T11:50:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/how-to-install-suricata-in-linux\\\/\"},\"wordCount\":426,\"publisher\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/how-to-install-suricata-in-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/How-to-install-Suricata-in-Linux_.png\",\"keywords\":[\"Cybersecurity\",\"File Signatures\",\"Heuristic Analysis\",\"Intrusion Detection System\",\"Intrusion Prevention System\",\"Malware Detection\",\"Network Security\",\"Network Threats\",\"Network Traffic Analysis\",\"Open-source Security Solutions\",\"Security Policies\",\"Suricata\"],\"articleSection\":[\"CyberSecurity\",\"Distributed Denial of Service\",\"Ethical Hacking\",\"Malware\",\"Network Security\",\"Ransomware\",\"Trojan\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/how-to-install-suricata-in-linux\\\/\",\"url\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/how-to-install-suricata-in-linux\\\/\",\"name\":\"How to install Suricata in Linux. - Hackzone Cyber Security Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/how-to-install-suricata-in-linux\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/how-to-install-suricata-in-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/How-to-install-Suricata-in-Linux_.png\",\"datePublished\":\"2023-01-16T13:46:22+00:00\",\"dateModified\":\"2023-02-01T11:50:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/how-to-install-suricata-in-linux\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hackzone.in\\\/blog\\\/how-to-install-suricata-in-linux\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/how-to-install-suricata-in-linux\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/How-to-install-Suricata-in-Linux_.png\",\"contentUrl\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/How-to-install-Suricata-in-Linux_.png\",\"width\":1200,\"height\":624,\"caption\":\"install-Suricata-in-Linux\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/how-to-install-suricata-in-linux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to install Suricata in Linux.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/\",\"name\":\"Hackzone Cyber Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#organization\",\"name\":\"Hackzone Cyber Security\",\"url\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/logo-light.png\",\"contentUrl\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/logo-light.png\",\"width\":438,\"height\":142,\"caption\":\"Hackzone Cyber Security\"},\"image\":{\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hackzone.in\",\"https:\\\/\\\/www.instagram.com\\\/hackzone_in\\\/\",\"https:\\\/\\\/wa.me\\\/918700832498\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/#\\\/schema\\\/person\\\/21baa23c7ede39c1a491da2e47566bce\",\"name\":\"Hack Zone\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/acec7ddf53542a85652c7291cc980df70e8e731cdc8bdc2fcd19bad8c0c2b9bb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/acec7ddf53542a85652c7291cc980df70e8e731cdc8bdc2fcd19bad8c0c2b9bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/acec7ddf53542a85652c7291cc980df70e8e731cdc8bdc2fcd19bad8c0c2b9bb?s=96&d=mm&r=g\",\"caption\":\"Hack Zone\"},\"sameAs\":[\"http:\\\/\\\/hackzone.in\\\/blog\"],\"url\":\"https:\\\/\\\/hackzone.in\\\/blog\\\/author\\\/abdulsamad\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to install Suricata in Linux. - Hackzone Cyber Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/","og_locale":"en_US","og_type":"article","og_title":"How to install Suricata in Linux. - Hackzone Cyber Security Blog","og_description":"Suricata is an open-source network intrusion detection and prevention system (IDS\/IPS) that can be used to detect and prevent cyber attacks on a computer network. It uses a variety of techniques, including signature-based detection and protocol analysis, to identify and block malicious traffic. Installing Suricata on a Linux operating system is a multi-step process that [&hellip;]","og_url":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/","og_site_name":"Hackzone Cyber Security Blog","article_publisher":"https:\/\/www.facebook.com\/hackzone.in","article_published_time":"2023-01-16T13:46:22+00:00","article_modified_time":"2023-02-01T11:50:14+00:00","og_image":[{"width":1200,"height":624,"url":"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/How-to-install-Suricata-in-Linux_.png","type":"image\/png"}],"author":"Hack Zone","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hack Zone","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#article","isPartOf":{"@id":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/"},"author":{"name":"Hack Zone","@id":"https:\/\/hackzone.in\/blog\/#\/schema\/person\/21baa23c7ede39c1a491da2e47566bce"},"headline":"How to install Suricata in Linux.","datePublished":"2023-01-16T13:46:22+00:00","dateModified":"2023-02-01T11:50:14+00:00","mainEntityOfPage":{"@id":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/"},"wordCount":426,"publisher":{"@id":"https:\/\/hackzone.in\/blog\/#organization"},"image":{"@id":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/How-to-install-Suricata-in-Linux_.png","keywords":["Cybersecurity","File Signatures","Heuristic Analysis","Intrusion Detection System","Intrusion Prevention System","Malware Detection","Network Security","Network Threats","Network Traffic Analysis","Open-source Security Solutions","Security Policies","Suricata"],"articleSection":["CyberSecurity","Distributed Denial of Service","Ethical Hacking","Malware","Network Security","Ransomware","Trojan"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/","url":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/","name":"How to install Suricata in Linux. - Hackzone Cyber Security Blog","isPartOf":{"@id":"https:\/\/hackzone.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#primaryimage"},"image":{"@id":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/How-to-install-Suricata-in-Linux_.png","datePublished":"2023-01-16T13:46:22+00:00","dateModified":"2023-02-01T11:50:14+00:00","breadcrumb":{"@id":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#primaryimage","url":"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/How-to-install-Suricata-in-Linux_.png","contentUrl":"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/01\/How-to-install-Suricata-in-Linux_.png","width":1200,"height":624,"caption":"install-Suricata-in-Linux"},{"@type":"BreadcrumbList","@id":"https:\/\/hackzone.in\/blog\/how-to-install-suricata-in-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hackzone.in\/blog\/"},{"@type":"ListItem","position":2,"name":"How to install Suricata in Linux."}]},{"@type":"WebSite","@id":"https:\/\/hackzone.in\/blog\/#website","url":"https:\/\/hackzone.in\/blog\/","name":"Hackzone Cyber Security","description":"","publisher":{"@id":"https:\/\/hackzone.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackzone.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hackzone.in\/blog\/#organization","name":"Hackzone Cyber Security","url":"https:\/\/hackzone.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hackzone.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/02\/logo-light.png","contentUrl":"https:\/\/hackzone.in\/blog\/wp-content\/uploads\/2023\/02\/logo-light.png","width":438,"height":142,"caption":"Hackzone Cyber Security"},"image":{"@id":"https:\/\/hackzone.in\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hackzone.in","https:\/\/www.instagram.com\/hackzone_in\/","https:\/\/wa.me\/918700832498"]},{"@type":"Person","@id":"https:\/\/hackzone.in\/blog\/#\/schema\/person\/21baa23c7ede39c1a491da2e47566bce","name":"Hack Zone","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/acec7ddf53542a85652c7291cc980df70e8e731cdc8bdc2fcd19bad8c0c2b9bb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/acec7ddf53542a85652c7291cc980df70e8e731cdc8bdc2fcd19bad8c0c2b9bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/acec7ddf53542a85652c7291cc980df70e8e731cdc8bdc2fcd19bad8c0c2b9bb?s=96&d=mm&r=g","caption":"Hack Zone"},"sameAs":["http:\/\/hackzone.in\/blog"],"url":"https:\/\/hackzone.in\/blog\/author\/abdulsamad\/"}]}},"_links":{"self":[{"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/posts\/7","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/comments?post=7"}],"version-history":[{"count":8,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/posts\/7\/revisions"}],"predecessor-version":[{"id":36,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/posts\/7\/revisions\/36"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/media\/8"}],"wp:attachment":[{"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/media?parent=7"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/categories?post=7"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackzone.in\/blog\/wp-json\/wp\/v2\/tags?post=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}