Evading Network-Based
Intrusion Detection Systems
¨Modify appearance of traffic so it does not match the signature
¨Change the context