cyber intrusion analysis