“…Signature-based detection is often realized as software products, relying on knowledge (i.e., signatures) supplied by opensource communities. Optimally selecting appropriate signatures, developed by security experts, could help (to a great extent) network operators (of medium/smaller enterprises) to quickly respond to emerging cyber threats, (e.g., "Log4Shell exploit" [40], [131], [80]). However, appropriately setting up the software environments, routinely updating signatures, and, importantly, trusting the open-source community may not always be feasible for administrators of large organizations.…”