There are also a variety of ways to detect an actual attack. This includes software applications that generate logs when something occurs within the application. If you have an antivirus program installed, it will scan these logs for signs of suspicious activity.