This document evaluates Snort, a network intrusion detection system, using rules formulated from the DARPA 1999 dataset to detect various types of attacks, including DoS, R2L, U2R, and probe attacks. It discusses the workings of Snort, including its rule development process and comparison of proposed detection rules with established metrics from the dataset. The study highlights the effectiveness of Snort in detecting attacks based on specific signature-based rules and showcases improvements in detection capabilities through various experimental setups.