Introducing Network Sentry for Automated Threat Response