Sample modify evasion: IDS normally depend upon 'pattern matching' to detect an attack. By altering the data Employed in the assault a little, it might be attainable to evade detection. Such as, an Internet Message Access Protocol (IMAP) server may be liable to a buffer overflow, and an IDS will be able to detect the assault signature of 10 typical