extrusion detection (I) Monitoring for unauthorized transfers of sensitive information and other communications that originate inside a system’s security perimeter and are directed toward the outside; i.e., roughly the opposite of "intrusion detection