Hi. I would like to know if attack signatures are Freely available in a form where they can be integrated in a software for intrusion detection purposes. I yes, could someone tell me where and whether there are good tutorials o documentation I can get on this topic.Thanking you for your consideration.