Relying on which of the following methods when detecting new threats using IDS should be of MOST concern?
A. Statistical pattern recognition
B. Attack signatures
C. Heuristic analysis
D. Traffic analysis
A. Statistical pattern recognition
B. Attack signatures
C. Heuristic analysis
D. Traffic analysis