The most fundamental approaches to detecting cyber intrusions are to monitor server logs for signs of unauthorized access, to monitor firewall or router logs for abnormal events, and to monitor network performance for spikes in traffic.
Collaboration and partnership between academia and law enforcement can bring about positive contributions for future research and activities in cybersecurity.