In the context of network security, attacks that are designed to evade detection by network devices or intrusion detection systems (IDS) typically fall under the category of "stealth" attacks.
Given the options provided:
- Covert: Generally refers to operations conducted in a concealed manner, but not specifically about evasion of IDS.
- Silent: Might imply a lack of noise but isn’t a widely recognized term in this context.
- Stealth: Specifically refers to attacks designed to avoid detection.
- Planned: This term could apply to many types of attacks but doesn't inherently imply concealment.
Therefore, the correct answer would be stealth, as these types of attacks are indeed designed to minimize detection and evade monitoring systems.