Intrusion Detection Evasion Techniques and Case Studies