Text this: A case study on attack detection capabilities between open-source intrusion detection systems

   _____     ___    __    __   _    _    ______   
  / ___//   / _ \\  \ \\ / // | || | || |      \\ 
  \___ \\  / //\ \\  \ \/ //  | || | || |  --  // 
  /    // |  ___  ||  \  //   | \\_/ || |  --  \\ 
 /____//  |_||  |_||   \//     \____//  |______// 
`-----`   `-`   `-`     `       `---`   `------`