The use of alert thresholding in an IDS can reduce the volume of repeated alerts, but introduces
which of the following vulnerabilities?
A.
An attacker, working slowly enough, can evade detection by the IDS.
B.
Network packets are dropped if the volume exceeds the threshold.
C.
Thresholding interferes with the IDS’ ability to reassemble fragmented packets.
D.
The IDS will not distinguish among packets originating from different sources.