Pattern modify evasion: IDS typically count on 'pattern matching' to detect an attack. By changing the info Employed in the assault a bit, it may be achievable to evade detection. As an example, an Internet Information Obtain Protocol (IMAP) server may very well be liable to a buffer overflow, and an IDS can detect the assault signature of 10 commo