One example is, an IDS might hope to detect a trojan on port 12345. If an attacker had reconfigured it to implement a unique port, the IDS may not be capable to detect the presence from the trojan. Disclaimer: The views expressed in this post are depending on private interpretation https://berniec849yxx5.techionblog.com/profile