Chapter 9 we covered the techniques for performing this action). There is much that we can do to identify this prowling activity, and detecting such activity serves as a form of early warning system. As well, some good research has been completed through DARPA sponsorship, which shows that there are often telltale signs of attack in just the protocol headers when analyzed with the proper techniques. When applied creatively, network intrusion detection has, andwill have, good utility in the fight to keep our networks secure.