Analyzing Security Attacks to Generate Signatures From Vulnerable Architectural Patterns