A software or hardware system which monitors communications patterns in packets circulating on a network to detect and notify of communication that is potentially unauthorized. Methods include comparing against communications patterns of known unauthorized access methods, or monitoring normal patterns and producing warnings when abnormal patterns are detected.