Pattern change evasion: IDS generally rely on 'sample matching' to detect an assault. By shifting the data used in the assault a bit, it may be feasible to evade detection. As an example, an Internet Information Entry Protocol (IMAP) server could possibly be at risk of a buffer overflow, and an IDS is able to detect the assault signature of ten typ