Watch this video on YouTube
What is a potential limitation of traditional intrusion detection systems (IDS)?