While some host-dependent intrusion detection techniques expect the log documents to become gathered and managed by a individual log server, Other individuals have their own log file consolidators crafted-in and in addition gather other facts, including network traffic packet captures.Suricata provides a intelligent processing architecture that all