Creating Network Attack Priority Lists by Analyzing Email Traffic Using Predefined Profiles