Analyzing attacks