The target is to lower detectability to reverse engineering or static Assessment process by obscuring it and compromising readability. Obfuscating malware, for instance, allows it to evade IDSes. Host intrusion detection techniques (HIDS) operate on personal hosts or units within the network. A HIDS monitors the inbound and outbound packets https://fifa2014wiki.com/