
Use Suricata as An Intrusion Detection System on AWS
This is Part 3 of a series. I highly recommend reading the first two posts in order before starting this one: 1️⃣ Secure AWS Lab Setup for Security Engineers: IAM Identity Center + SSM + Zero Open Ports Learn how to set up AWS IAM Identity Center, SSM Session Manager, and a zero-open-ports EC2 instance. This post assumes you have completed this setup. 2️⃣ Fish Shell Functions for Managing AWS EC2 Instances — Save Time and Billing Learn how to use fish shell functions ( lab-create , lab-connect , lab-snapshot , lab-restore , etc.) to manage your EC2 lab efficiently. The commands in this post assume you have these functions installed. ⚠️ Your instance IP changes every session. Every time you run lab-restore or lab-create a new EC2 instance is launched with a different private IP address. Before running any commands in this post that reference an IP address (curl tests, nmap, suricata.yaml HOME_NET ), always check your current IP first: ip addr show enX0 | grep "inet " Replace 172.31.23.1
Continue reading on Dev.to
Opens in a new tab
![[Learning notes and hw] getting started with R-cnn: Manually implementing Intersection over Union (IoU)](/_next/image?url=https%3A%2F%2Fmedia2.dev.to%2Fdynamic%2Fimage%2Fwidth%3D800%252Cheight%3D%252Cfit%3Dscale-down%252Cgravity%3Dauto%252Cformat%3Dauto%2Fhttps%253A%252F%252Fdev-to-uploads.s3.amazonaws.com%252Fuploads%252Farticles%252Favit2emoxc0g68e5ltqj.jpg&w=1200&q=75)



