This would result in early detection of suspicious certificates and would trigger
mechanisms to defeat the attack; minimize its impact; and gather information on the attackers.
Additionally, a more detailed and thorough analysis could be performed.
This would result
early detection