RUDY Attack: Detection at the Network Level and Its Important Features