Watch this video on YouTube
A security analyst suspects that an AI model is being targeted with a Denial of Service attack. Which method should they use to confirm this?