Challenges in Detecting Cyber Attacks