Watch this video on YouTube
What should be the PRIMARY concern when depending on which of the following approaches for detecting new threats using Intrusion Detection Systems (IDS)?