I just ran the command:
sudo tcpdump -n -i eth1 -e 'arp or icmp'
on the Security Onion VM and I am seeing plenty of arp traffic related to the ettercap attack including the "who-has" requests and then the resulting "is at" re-direct replies where the two hosts being attacked now relay through the attacker. So the issue of no SO events is not related to lack of visibility.
My enablement of the arpspoof preprocessor looks likt this:
# ARP spoof detection. For more information, see the Snort Manual - Configuring Snort - Preprocessors - ARP Spoof Preprocessor
preprocessor arpspoof: -unicast
preprocessor arpspoof_detect_host: 192.168.3.1 ba:f6:b1:xx:yy:zz
preprocessor arpspoof_detect_host: 192.168.3.4 b8:27:eb:xx:yy:zz
preprocessor arpspoof_detect_host: 192.168.3.20 00:0c:29:xx:yy:zz
where I use the actual MAC addresses for these hosts.
So still a little puzzled, although I appreciate that NSM is not the best place for detecting this type of attack.
Jim