The Next Evolution for the Intrusion Kill Chain Prevention Strategy