Similar cyber events or behaviors that may indicate an attack has occurred or is occurring, resulting in a security violation or a potential security violation.

Extended Definition: For software, descriptions of common methods for exploiting software systems.

Related Term(s): Attack Signature

Adapted from: Oak Ridge National Laboratory Visualization Techniques for Computer Network Defense, MITRE's CAPEC web site