Watch this video on YouTube
In the context of honeypot evasion, why would a cyber attacker want to analyze the response time of network services during an engagement?