Which of the following strategies can be used to defeat detection by a network-based IDS application?