For example, an IDS may possibly expect to detect a trojan on port 12345. If an attacker had reconfigured it to use a distinct port, the IDS is probably not in a position to detect the existence of your trojan. An example of an NIDS could be installing it about https://38830639.loginblogin.com/40886065/details-fiction-and-ids