There are many methods intruders may perhaps use to stop detection by IDS. These solutions can create difficulties for IDSes, as they are intended to bypass present detection procedures: In the event the resource is spoofed and bounced by a server, it makes it very difficult for IDS to detect the origin with the attack. Can 'the journal' be a