An IDS only ought to detect prospective threats. It is actually positioned out of band to the network infrastructure. For that reason, It's not in the actual-time interaction path concerning the sender and receiver of information. Obfuscation may be used to avoid remaining detected by creating a message obscure, thus hiding an assault. The termi