Sample transform evasion: IDS commonly trust in 'sample matching' to detect an attack. By switching the info Employed in the assault a little bit, it could be attainable to evade detection. By way of example, an online Concept Access Protocol (IMAP) server may be liable to a buffer overflow, and an IDS can detect the assault signature of 10 common