Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks. (October 2015)