Cutting off stealthy interlopers: a framework for secure cyb