932683.fig.003
Figure 3: An illustration of the detection of attack and attacker.