Intrusion Patterns Unmasked