Detecting exploit patterns from network packet streams