For example, an assault on an encrypted protocol cannot be go through by an IDS. In the event the IDS can not match encrypted visitors to existing database signatures, the encrypted traffic just isn't encrypted. This makes it very hard for detectors to discover assaults. Expensive all is perfectably acceptable. https://ids07306.wikipublicity.com/6290243/the_2_minute_rule_for_ids