Match the four nodes of the diamond model for intrusion analysis with the proper description