Network attacks describe the intrusion of a private or company network from the outside. The purposes strongly can vary from simple disruptions (for the fun of it) to data theft, malfunctions and even network hijacks (by means of e.g. Ransomware). Quite often a port scan functions as a precursor of an attack to gain information about the network condition and structure. This is later used to decide for the best method of infiltration. Hence, the technical solution for an effective cyber security strategy needs a consistent monitoring to report any suspicious activities as early as possible (and in real-time).