The attacker intends to determine which entities are communicating with each other without the ability to access the communicated information.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.