# Monitoring Solutions AI Red Teamers interact with monitoring tools primarily to test their effectiveness (evasion) or potentially exploit vulnerabilities within them. Understanding tools like IDS (Snort, Suricata), network analyzers (Wireshark), and SIEMs helps red teamers simulate attacks that might bypass or target these defensive systems. Learn more from the following resources: - [@article@Open Source IDS Tools: Comparing Suricata, Snort, Bro (Zeek), Linux - LevelBlue](https://levelblue.com/blogs/security-essentials/open-source-intrusion-detection-tools-a-quick-overview) - Comparison of common open source monitoring tools. - [@tool@Snort](https://www.snort.org/) - Open source IDS/IPS. - [@tool@Suricata](https://suricata.io/) - Open source IDS/IPS/NSM. - [@tool@Wireshark](https://www.wireshark.org/) - Network protocol analyzer. - [@tool@Zeek (formerly Bro)](https://zeek.org/) - Network security monitoring framework.