Attack modeling in the critical infrastructure