If an attacker knew a network-based IDS like Snort was running in a targeted environment, how might the attacker try to evade detection? Provide at least two examples of IDS evasion techniques that might be used by an attacker, and suggest a remedy or defense against the techniques you cite.
The question belongs to Computer Science and it discusses about how an attacker who knows a tool like Snort is running and how does he try to evade detection with examples.
Total Word Count 63Download Full Solution
If you are here for the first time, you can request for a discount coupon, which can knock off upto 20% of the quoted price on any service.