Analysis Of E-Mail Attachment Signatures For Potential Use By Intrusion Detection Systems