Malware may be encrypted, in which case, the first step in executing the malware is to decrypt the rest of the code. By this means,every copy of the malware can be different, just by changing the decryption key. Does this mean IDS- INTRUSION DETECTION SYSTEM is useless? Explain your answer.