Sample transform evasion: IDS normally depend upon 'pattern matching' to detect an attack. By changing the info Utilized in the attack a bit, it might be feasible to evade detection. For instance, an Internet Information Entry Protocol (IMAP) server could possibly be susceptible to a buffer overflow, and an IDS has the capacity to detect the attack