This guide provides step-by-step instructions for deploying the complete IDPS-ESCAPE stack, including signature-based intrusion detection (Suricata), SIEM & XDR (Wazuh), and anomaly detection components (SONAR/ADBox).
For rapid deployment of RADAR with integrated Wazuh manager and agents:
cd radar
./build-radar.sh <scenario> --agent <local|remote> --manager <local|remote> --manager_exists false
See the RADAR README for detailed usage and scenario options.
Use this approach if you have existing Wazuh infrastructure or need custom configuration.
Purpose: Enable network-level monitoring and intrusion detection.
Installation options:
a. Containerized environment: Follow Suricata installation guide
b. Configuration: Adapt to your local network using the configuration guide
Purpose: Centralized log collection, event correlation, and security monitoring.
Installation:
a. Deploy Dashboard, Manager, and Indexer: Follow Wazuh installation guide for containerized deployment
b. Configure for your environment: Complete system configuration steps
Purpose: Monitor endpoint activity, file integrity, and host-level events.
Installation:
a. Primary host agent: Follow Wazuh agent installation
b. Additional endpoints (optional): Deploy agents on other systems following the same procedure
c. Remote traffic monitoring (optional): Enable remote monitoring capabilities
Purpose: Unified network and host event correlation in SIEM.
Follow the Suricata-Wazuh integration procedure to:
Benefits:
Purpose: ML-based anomaly detection on centralized SIEM data.
Option A: SONAR (Production - Recommended)
# Install SONAR
poetry install --with sonar
# Configure Wazuh connection
# Edit sonar/default_config.yaml with your Wazuh credentials
# Verify connection
poetry run sonar check
# Run detection scenario
poetry run sonar scenario --use-case sonar/scenarios/example_scenario.yaml
See SONAR setup guide for detailed configuration.
Option B: ADBox (Research/Legacy)
# Build Docker image
./build-adbox.sh
# Configure Wazuh connection
# Edit adbox/assets/secrets/wazuh_credentials.json
# Verify connection
./adbox.sh -c
# Run detection use-case
./adbox.sh -u 1
See ADBox installation guide for details.
After deployment, verify the integrated stack:
┌─────────────┐
│ Suricata │ (Network IDS)
└──────┬──────┘
│ network alerts
↓
┌─────────────────────────────────────┐
│ Wazuh Manager │ (SIEM & XDR)
│ ┌──────────────┐ ┌─────────────┐ │
│ │ Log Collector│ │ Rule Engine │ │
│ └──────────────┘ └─────────────┘ │
└────────────┬────────────────────────┘
│ indexed alerts
↓
┌─────────────────────────────────────┐
│ Wazuh Indexer (OpenSearch) │
└────────────┬────────────────────────┘
│ query alerts
↓
┌─────────────────────────────────────┐
│ SONAR / ADBox (Anomaly Det.) │
│ ↓ anomalies ↓ │
│ Wazuh Data Streams (RADAR) │
└─────────────────────────────────────┘
Common issues:
For detailed troubleshooting, consult component-specific documentation.