Pattern alter evasion: IDS generally rely upon 'sample matching' to detect an attack. By changing the info Employed in the assault marginally, it may be possible to evade detection. Such as, an online Message Obtain Protocol (IMAP) server can be prone to a buffer overflow, and an IDS has the capacity to detect the attack signature of ten widespread