Pattern modify evasion: IDS typically depend upon 'sample matching' to detect an attack. By shifting the info Employed in the attack a little, it could be possible to evade detection. By way of example, a web Information Obtain Protocol (IMAP) server could possibly be liable to a buffer overflow, and an IDS is able to detect the attack signature of