Text this: A case study on attack detection capabilities between open-source intrusion detection systems

 ______     ______    ______     ___     __   __  
|      \\  /_   _//  /_   _//   / _ \\   \ \\/ // 
|  --  //   -| ||-     | ||    / //\ \\   \   //  
|  --  \\   _| ||_    _| ||   |  ___  ||  / . \\  
|______//  /_____//  /__//    |_||  |_|| /_//\_\\ 
`------`   `-----`   `--`     `-`   `-`  `-`  --`