Attributing Cyber-attacks: The cyclic nature of it