Scenario 1: An internal server begins to receive high volumes of connection attempts on a non-standard port. Investigation reveals that the server is compromised, and the attacker has set up a shell knocker to gain remote access.
Scenario 2: A sudden spike in network traffic is detected, targeting specific sequences of connection attempts to a server. Further analysis indicates that a penetration testing team was performing a scheduled security assessment.