Intrusion Alerts Analysis Using Attack Graphs and Clustering