Slide 1 Misuse detection systems Slide 2 2/177 Contents Overview of signature based IDS SNORT SNORT rules Slide 3 3/177 Overview of signature based IDS Signature-based detection…