Developing SNORT IDS Rules For A Fictitious Security Vulnerability In A Range Of Laser Printers