Evading Network-Based
Intrusion Detection Systems
¨
Modify appearance of traffic so it does not
match the signature
¨
Change the context