Your network is fine, and there is no 'malicious traffic' on your network.
Thanks to your packet capture, which I opened in a sandbox, all the multicast traffic that Snort is seeing is from different sources.
Multicast DNS aka MDNS. MDNS resolves hostnames to IP addresses in a network by using Multicast to send DNS to everything on the network attempting to find a response for the IP address <--> Hostname request matching.
SSDP - Simple Service Discovery Protocol - is used to discover UPnP and other open port protocols for simple service discovery. THIS is generating the UPnP packet noise. Assuming that 192.168.100.254 is your router, it's actively searching for any UPnP devices on your network so it can do its thing. This needs shut off at the router of your network which is beyond the scope of this question and Ask Ubuntu.
There's also ARP packets (how systems ID which MAC addresses exist on the network segment for a requested IP), and IPv6 router advertisements. Both are normal.
So while there isn't any real threat from UPnP service discovery to your computer, and you probably can consider these Snort alerts "non-issues", you should probably shut UPnP off on your router if you can. If that is not possible because you don't control your network's router, then you may want to start fine-tuining Snort alerts to actually malicious traffic categories you want to block on, not low-level informational and non-problematic traffic.