The cyber attribution challenge: Identifying and deterring cyber attacks