There are a number of techniques which attackers are working with, the next are considered 'very simple' actions which can be taken to evade IDS:Fred Cohen famous in 1987 that it is unachievable to detect an intrusion in every case, and that the assets necessary to detect intrusions expand with the quantity of usage.[39]Signature-Centered Detection