Which of the following is when the attacker sends traffic slower than normal, not exceeding thresholds inside the time windows the signatures use to correlate different packets together?
A . Traffic insertion
B . Protocol manipulation
C . Traffic fragmentation
D . Timing attack
Answer: D