Experts said attackers are exploiting security holes in network services and protocols, because most of the flaws in applications have been ferreted out.