Sample transform evasion: IDS normally rely upon 'sample matching' to detect an assault. By transforming the info Employed in the assault a little, it might be achievable to evade detection. By way of example, an online Concept Entry Protocol (IMAP) server could be at risk of a buffer overflow, and an IDS is ready to detect the attack signature of