The process by which an attacker changes the format of the network packets and/or timing of their activities to avoid being detected by the IDPS.
The process by which an attacker changes the format of the network packets and/or timing of their activities to avoid being detected by the IDPS.