Giving A fast and successful reporting technique when anomalous or destructive action occurs, which permits the menace to get handed up the stack As an example, an IDS may perhaps count on to detect a trojan on port 12345. If an attacker had reconfigured it to employ a distinct port, the IDS is probably not capable to detect the presence of your