Intrusion Detection Systems

Respond to the following in a minimum of 275 words:Discuss different techniques used to evade Intrusion Detection Systems (IDS) as if you were a hacker.Feel free to use keyword Internet searches to hone in on different perspectives to help provide a robust discussion this week.