Visible to the public Preemptive Intrusion Detection: Theoretical Framework and Real-world Measurements