Return home icon Return to lab experiments icon

Syrax Operations · Lab Experiments

Lab Experiment 001 — Reconnaissance, Disruption, and Detection Engineering

Simulated reconnaissance and disruptive traffic using tools such as Nmap and hping3, analysing detection behaviour in Suricata through EveBox, and identifying detection gaps addressed through custom rule development.

Date

06 Apr 2026

Focus

Detection Analysis, Rule Engineering, and Traffic Behaviour

Disclaimer

All activities presented in this study were conducted within a controlled and isolated lab environment using VMware Fusion, virtual machines, and host-only network configurations.

This work is intended for educational, research, and exploratory purposes only. No testing was performed against live or unauthorised systems.

The techniques demonstrated should not be reproduced or executed outside of a properly scoped and authorised environment. Any replication must be carried out within a safe, controlled lab setup.

Scenario Context

This study simulates reconnaissance and disruptive network activity within a controlled lab environment to observe how detection systems respond to different traffic patterns. The objective is to evaluate alert generation, visibility, and how effectively detection signals can be interpreted for defensive purposes.

Objective

Evaluate how reconnaissance and disruption traffic manifests in Suricata detections, and assess how effectively those events can be interpreted within EveBox for defensive analysis and triage.

Environment Setup

  • Attacker: Kali Linux (Nmap, hping3)
  • Detection Engine: Suricata (Network IDS)
  • Analysis Interface: EveBox
  • Network Scope: Isolated virtual lab using a host-only network segment, with a dual-homed Ubuntu gateway routing all traffic through Suricata for inspection.

Logs were cleared prior to each test to isolate detection results and ensure that observed alerts correspond directly to the simulated activity.

Methodology

Phase 1 — Reconnaissance (Nmap)

Multiple scan techniques were conducted using Nmap to simulate different reconnaissance behaviours. Each scan type was selected to represent varying levels of stealth, aggressiveness, and detectability.

Phase 2 — Disruption (hping3)

Custom packet generation was performed using hping3 to simulate disruptive network behaviour through high-volume and manipulated traffic patterns. This phase focused on SYN-based flooding techniques targeting common service ports, introducing sustained packet transmission designed to stress network visibility and detection mechanisms.

Analysis — Behaviour and Detection Patterns

The experiment revealed clear differences between reconnaissance and disruption behaviour in terms of detection and alert generation.

Reconnaissance traffic produced structured and identifiable scanning patterns, resulting in moderate and interpretable alert activity. In contrast, disruption-based traffic significantly increased alert volume, generating repeated signatures and introducing noise that reduced overall clarity.

Repeated alerts from the same source demonstrated how detection systems prioritise pattern recognition over isolated events. This highlights the importance of correlating alerts over time rather than relying on individual detections.

Detection Limitations and Operational Impact

The results show that detection does not automatically translate into actionable intelligence. High-frequency traffic can generate excessive alerts, leading to potential alert fatigue and reduced effectiveness in real-world scenarios.

Additionally, earlier phases demonstrated that certain behaviours, such as stealth-based reconnaissance and high-volume SYN flooding, may evade detection entirely without appropriate rule coverage. This reinforces that IDS effectiveness is highly dependent on rule design, tuning, and context.

Deterrence Considerations

The presence of detection systems introduces visibility into network activity, which can act as a deterrent by increasing the likelihood of detection and traceability.

However, the effectiveness of deterrence depends on the ability to quickly interpret and act on alerts, minimise excessive noise, and implement response mechanisms tied to detection events. Without proper tuning, high alert volumes may reduce the practical effectiveness of detection as a deterrent.

Key Takeaways

  • Detection is dependent on rule coverage, not just traffic behaviour
  • High-volume traffic can overwhelm visibility without proper thresholds
  • Stealth and low-noise activity may bypass default detection mechanisms
  • Effective monitoring requires correlation, filtering, and prioritisation

Next Steps

  • Refine detection thresholds to reduce repetitive alerts
  • Map common signatures to response or triage categories
  • Expand testing to include additional protocols and traffic patterns
  • Explore alert filtering and correlation strategies within EveBox
Return to Lab Experiments Overview