Automated intrusion attack with permanent control: Analysis and countermeasures