Sample modify evasion: IDS typically trust in 'pattern matching' to detect an attack. By shifting the information used in the attack a little bit, it might be doable to evade detection. One example is, a web Concept Accessibility Protocol (IMAP) server might be vulnerable to a buffer overflow, and an https://ok-social.com/story4600194/388-secrets