Text this: Utilizing Snort in the Analysis of Intrusion Detection System