Reducing Dwell Time of POS Attacks Can be Deceptively Simple