If an attacker knew a network-based IDS like Snort was running in a targeted environment, how might the attacker try to evade detection? Provide at least two examples of IDS evasion techniques that might be used by an attacker, and suggest a remedy or defense against the techniques you cite.
Additional information
The problem related to Computer Science and it explains about how an attacker who knows a tool like Snort is running and how does he try to evade detection with examples.
Word limit: 125