IDS/IPS Alerts (Snort/Suricata)
NetworkPerimeter SecurityNetwork CaptureSIEM / Log Aggregator
Location
IDS/IPS alert logs (Snort alert files, Suricata eve.json, SIEM-ingested alerts)Description
Signature-based and anomaly-based intrusion detection alerts with rule SID, severity, source/destination IP and port, protocol, alert message, and reference to the triggering packet.
Forensic Value
IDS alerts provide immediate, high-confidence indicators when signature matches occur for known exploits, malware communication patterns, or policy violations. Suricata eve.json output includes the triggering rule details and associated flow metadata. Even in high-noise environments, filtering by severity and correlating with other artifacts narrows the focus. Alert timestamps establish the earliest detection of malicious activity, supporting timeline construction.
Tools Required
SuricataSnortSIEM (Splunk, Elastic)SquilSguil
Collection Commands
Suricata
cat /var/log/suricata/eve.json | jq 'select(.event_type=="alert") | {timestamp, src_ip, dest_ip, dest_port, alert: .alert.signature, severity: .alert.severity}' > suricata_alerts.jsonSnort
snort -r capture.pcap -c /etc/snort/snort.conf -A full -l /tmp/snort_output/ && cat /tmp/snort_output/alert > snort_alerts.txt
Splunk
index=ids sourcetype=suricata:alert earliest=-7d severity<=2 | stats count by alert.signature, src_ip, dest_ip | sort -count | head 50
MITRE ATT&CK Techniques
T1190T1595T1071T1059T1203