How Network Traffic Analysis Detects Data Exfiltration

How Network Traffic Analysis Detects Data Exfiltration How Network Traffic Analysis Detects Data Exfiltration

How does network traffic analysis differentiate between legitimate and malicious encrypted traffic?