Intrusion Analysis and Response