Network attack patterns describe the behaviors, traffic flows, packet sequences, and communication styles used by attackers during scanning, exploitation, C2 communication, lateral movement, and data exfiltration.
These patterns are visible in firewall logs, IDS/IPS logs, DNS logs, proxy logs, and NetFlow — allowing SOC analysts to identify intrusions even when malware indicators or IOCs are not present.
This chapter explains network attack patterns in full-scale, ultra-practical SOC depth, including raw log examples, detection logic, analyst workflows, and SIEM queries.
What Network Attack Patterns Are
A network attack pattern is a repeatable, recognizable behavior in network traffic that signals malicious intent.
Network attack patterns reveal:
-
Scanning behavior
-
Reconnaissance
-
Exploitation attempts
-
Lateral movement
-
Malware beaconing
-
Data exfiltration
-
Protocol abuse
Attackers may hide files, hashes, and domains — but network behavior is significantly harder to disguise, making attack patterns one of the strongest SOC detection methods.
Core Network Attack Pattern Categories
Below are the major categories with realistic examples exactly how SOC analysts observe them.
1. Port Scanning Patterns
Attackers scan networks to identify open ports or exploitable services.
Horizontal Scan (same port, many hosts)
SRC=185.22.11.44 DPT=22 → 10.0.0.2
SRC=185.22.11.44 DPT=22 → 10.0.0.3
SRC=185.22.11.44 DPT=22 → 10.0.0.4
Vertical Scan (many ports, same host)
DPT=21,22,23,80,443,3306,8080 from same SRC
Full Recon Scan
Using Nmap/Masscan:
ET SCAN Nmap Scripting Engine
Attack Impact:
-
Reveals attacker reconnaissance
-
Precedes brute force or exploitation
2. Brute Force Attack Patterns
Repeated failed login attempts over the network.
SSH Brute Force (Firewall + auth log)
DROP SRC=185.* DPT=22 (repeated)
RDP Brute Force
SRC=185.* DPT=3389 SYN flood
Characteristics:
-
High-frequency attempts
-
Same user accessed repeatedly
-
Often from botnets
3. Web Exploitation Patterns
Visible in proxy and IDS logs.
SQL Injection
GET /login.php?id=1' OR '1'='1
Directory Traversal
GET /../../../../../etc/passwd
Remote Code Execution (RCE)
POST /struts2-showcase/index.action?...
Exploit Kits
/ek/landing.php?id=4421
These patterns indicate active exploitation attempts.
4. Malware C2 Communication Patterns
Malware communicates with C2 servers in distinctive ways.
Fixed Interval Beaconing
DNS query to status-checkin.net every 60 seconds
Small HTTPS POST Requests
POST /status size=200 bytes response=204
Encrypted Payload Over Non-Standard Ports
TCP 8081 outbound to unknown IP
Randomized Subdomains
dj2910qws.xjpqz.net
Patterns like these reveal malware even when signatures fail.
5. DNS Abuse Patterns
Attackers use DNS for covert operations.
DGA Domains
a9219dasj9as.biz → repeated NXDOMAIN
DNS Tunneling
TXT queries > 200 characters
Base64-like strings
C2 via DNS
query: beacon-update-service.net
DNS-based patterns are powerful for early detection.
6. Lateral Movement Patterns
Internal network traffic reveals attacker movement.
SMB-Based Movement
10.0.0.5 → 10.0.0.10 DPT=445
WinRM or WMI
DPT=5985 or DPT=5986 repeated internal connections
SSH Pivoting (Linux)
SRC=10.0.0.25 DPT=22 internal to multiple servers
These patterns usually follow initial compromise.
7. Data Exfiltration Patterns
Attackers send stolen data out of the organization.
Large Outbound POST Requests
POST /upload SIZE_OUT=6MB
DNS Exfiltration
TXT records with long encoded strings
Unusual File Transfer Protocols
SCP outbound to unknown IP
Spikes in Outbound Traffic
Outbound traffic 20x normal baseline
Exfiltration patterns indicate breach escalation.
8. Botnet / Cryptomining Patterns
Mining Pool Traffic
STRATUM protocol outbound to pool.minexmr.com
High-Volume Persistent Connections
constant TCP connections → external pool
Sudden Spike in CPU + Network
Monitored via host + network logs.
9. Reconnaissance Through DNS Patterns
Attackers enumerate subdomains using DNS.
query: ftp.target.com
query: admin.target.com
query: db1.target.com
query: vpn.target.com
Sequential lookups = targeted recon.
Real Attack Scenario Using Network Attack Patterns
Step 1 — External Recon
ET SCAN Nmap Scripting Engine
Step 2 — Vertical Scan on Web Server
DPT=80,443,8080,8000,3306
Step 3 — Exploit Attempt Logged
ET EXPLOIT Apache Struts RCE
Step 4 — Malware Download
Proxy:
URL=http://malicious.ru/dropper.exe
Step 5 — C2 Communication Pattern
POST /status every 60 seconds
Step 6 — Lateral Movement
10.0.0.5 → 10.0.0.22 DPT=445
Step 7 — Data Exfiltration
POST 4MB to https://file.io/upload
Network patterns reveal the entire kill chain.
SIEM Queries for Network Attack Pattern Detection
Port Scanning
count(DPT) > 10 by SRC in 1 minute
Brute Force Patterns
DPT=22 AND action:DROP AND src_ip:<same_ip>
Beaconing Detection
same_domain AND query interval < 90 seconds
Lateral Movement
src_ip:10.* AND dst_ip:10.* AND DPT:(445 OR 3389 OR 5985)
Exfiltration
POST AND bytes_out > 1000000
DNS Tunneling
query_length > 150 AND query_type:TXT
C2 Domains
domain IN threat_intel AND repeated queries
Analyst Workflow for Network Attack Pattern Investigations
-
Identify suspicious network behavior
-
Categorize pattern (scanning, exploit, beacon, exfiltration, etc.)
-
Map affected hosts
-
Correlate with host logs (Sysmon, Linux)
-
Identify initial access point
-
Check for lateral movement
-
Evaluate whether malware executed
-
Check for persistence or privilege escalation
-
Build full attack timeline
-
Escalate incident and isolate compromised systems
Network patterns allow SOC analysts to detect attacks even when malware leaves no file-based trace.
Intel Dump
-
Network attack patterns reveal scanning, exploitation, C2 activity, lateral movement, and exfiltration.
-
Attack patterns rely on attacker behavior rather than static indicators.
-
Logs like IDS/IPS, firewall, DNS, proxy, and NetFlow provide visibility.
-
Common patterns include beaconing, brute force, DGA domains, DNS tunneling, SMB lateral movement, and large outbound POST requests.
-
SIEM queries detect frequency anomalies, suspicious ports, encoded DNS traffic, repeated beaconing, and data exfiltration.
-
Network attack patterns expose full kill chains even when malware hides from endpoint detection.