Sample change evasion: IDS commonly rely on 'pattern matching' to detect an assault. By changing the data Employed in the assault a little, it could be doable to evade detection. By way of example, an online Message Access Protocol (IMAP) server may very well be vulnerable to a buffer overflow, and an IDS is able to detect the attack signature of t