From charlesreid1

Analyzing logs for attacks:

http://resources.infosecinstitute.com/log-analysis-web-attacks-beginners-guide/

Inspired by this talk:

https://www.youtube.com/watch?v=bDJb8WOJYdA

The successful attacker will know your network better than you do. They will know what is actually running on your network, as opposed to what you intended to run on your network.