Evolution of an attacker's footprint wihin the target network