Scenario 1: An internal host starts sending a high number of SYN packets to various ports on external IP addresses. Upon investigation, it is found that the host is infected with malware, and the attacker is using it to scan for vulnerable services on the internet.
Scenario 2: A sudden spike in outbound port scanning activity is detected. Further analysis reveals that a network security team was performing an authorized external vulnerability assessment without prior notification, leading to the detection trigger.