Numerous assaults are geared for unique versions of application that are usually outdated. A constantly shifting library of signatures is needed to mitigate threats. Outdated signature databases can go away the IDS prone to more recent methods.[35] Fred Cohen mentioned in 1987 that it is unachievable to detect an intrusion in every situation, an