Which of the following strategies can the employee use to evade detection by a network-based IDS application?