Attack-Detection Architectural Framework Based on Anomalous Patterns of System Performance and Resource Utilization—Part II