To prepare for this Discussion, locate a network-based intrusion-detection tool (other than an NIDS) on the Internet and study it thoroughly.
Critique the tool you have selected and provide two techniques that an attacker might use to avoid being detected by this tool.