Intrusion Model for Intrusion Tolerance System by Using Capabilities of Attackers