To spot intruders in network security, monitor for unusual activities like unauthorized access attempts, spikes in traffic, or unfamiliar IP addresses. Using tools like intrusion detection systems (IDS) and regularly analyzing log files can help detect potential threats early.