Morphing to Legitimate Behavior Attack Patterns