Pattern transform evasion: IDS commonly depend upon 'pattern matching' to detect an attack. By altering the data Employed in the assault a little, it might be attainable to evade detection. By way of example, an Internet Message Obtain Protocol (IMAP) server can be prone to a buffer overflow, and an IDS will be able to detect the assault signature