Discovering brute-force and application attacks