Which one of the following attacks will pass through a network layer intrusion detection system undetected?