The target is to reduce detectability to reverse engineering or static Examination system by obscuring it and compromising readability. Obfuscating malware, For example, permits it to evade IDSes. This is a very practical exercise, since as opposed to showing genuine breaches to the network that built it from the firewall, https://ids31852.muzwiki.com/7493911/little_known_facts_about_ids