Analyzing brute force attacks