How Network Traffic Analysis Detects Data Exfiltration

How does network traffic analysis differentiate between legitimate and malicious encrypted traffic?