This document discusses using the Snort intrusion detection system to detect network threats. It begins with an abstract that introduces Snort and the shift from intrusion detection to prevention. The document then covers Snort components, configuration, implementation and testing on a network. Snort rules were created and tested to detect ICMP ping requests from an attacking machine. Network traffic was analyzed using Snort logs and Wireshark to identify the attacking packets. The conclusion is that Snort is an effective lightweight intrusion detection system that can detect network threats using its built-in and customized rules.