Analysis of techniques and attacking pattern in cyber security approach