This project investigates the detection of common cybersecurity attacks using the SNORT intrusion detection system (IDS). It begins with an introduction to the importance of IDS in protecting information systems from various threats, including DDoS attacks and malicious activities. The report provides a literature review on intrusion detection systems, network-based intrusion detection and prevention systems, and network behavior analysis systems, with a detailed focus on SNORT. The research methodology includes a pragmatic research philosophy and a research design incorporating data collection methods and sampling strategies. The findings and analysis section covers the use of SNORT as a tool, its deployment, and the identification of common OWASP attacks. The project applies penetration testing methodologies to simulate attacks and optimize SNORT rules to capture suspicious activity. The project concludes with recommendations for enhancing network security through SNORT implementation and rule customization. The project also examines the use of Kali Linux as an attacker and Wireshark for network packet detection.