%0 Journal Article %T Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems %A Hossein Jadidoleslamy %J International Journal of Computer Science and Engineering Survey %D 2012 %I Academy & Industry Research Collaboration Center (AIRCC) %X One of most important existent issues in information security application domain is Intrusion Detection System (IDS); IDS is a defensive-aggressive system to protect information, verifying and responding tooccurring attacks on computer systems and networks. This paper discusses different topics including presenting some strategies against IDSs to passing from them; this leads to improving detection level and performance of IDS; also, this paper considers some intrusion tools, new attacks patterns and trackingprevention techniques. In addition, it discusses vulnerabilities, security holes and IDSs' structural and systemic problems to eliminating defects, reducing penetrates and correcting their behavior. Finally, it leads to increasing the functionality coefficient of IDSs, promoting the security level of computer systems and networks, increasing the trust of authorized users. So, the proposed methods in this paper can apply to improving the IDSs by using inverse engineering methods. %K Security %K Intrusion %K Intrusion Detection System (IDS) %K Detection %K Prevention %K Computer Network & Intruder. %U http://airccse.org/journal/ijcses/papers/3412ijcses02.pdf