Analyzing selected network attacks