Figure 6.19 A network-based intrusion detection
system configured to detect telnet access to a server