Sample transform evasion: IDS commonly trust in 'pattern matching' to detect an attack. By altering the information Utilized in the attack somewhat, it may be possible to evade detection. Such as, a web Concept Accessibility Protocol (IMAP) server may very well be liable to a buffer overflow, and an IDS can detect the assault signature of 10 typica