By modifying the payload sent with the Resource, so that it does not resemble the information the IDS expects, it could be feasible to evade detection. Coordinated, very low-bandwidth attacks: coordinating a scan among the many attackers (or brokers) and allocating distinctive ports or hosts to various attackers causes it to be difficult to the