Figure 6.19 A network-based intrusion detection system configured to detect telnet access to a server