On the Upward Migration of an Intrusion